ExamGecko
Question list
Search
Search

Related questions











Question 498 - 312-50v12 discussion

Report
Export

CyberTech Inc. recently experienced SQL injection attacks on its official website. The company appointed Bob, a security professional, to build and incorporate defensive strategies against such attacks. Bob adopted a practice whereby only a list of entities such as the data type, range, size, and value, which have been approved for secured access, is accepted. What is the defensive technique employed by Bob in the above scenario?

A.
Output encoding
Answers
A.
Output encoding
B.
Enforce least privileges
Answers
B.
Enforce least privileges
C.
Whitelist validation
Answers
C.
Whitelist validation
D.
Blacklist validation
Answers
D.
Blacklist validation
Suggested answer: C

Explanation:

Defenses in the Application - Input Validation Whitelist Validation, Whitelist validation is a best practice whereby only the list of entities (i.e., data type, range, size, value, etc.) that have been approved for secured access is accepted.

Whitelist validation can also be termed as positive validation or inclusion. (P.2164/2148)

asked 18/09/2024
Elena Albu
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first