ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 360 - SY0-601 discussion

Report
Export

A security analyst is assisting a team of developers with best practices for coding. The security analyst would like to defend against the use of SQL injection attacks. Which of the following should the security analyst recommend first?

A.
Tokenization
Answers
A.
Tokenization
B.
Input validation
Answers
B.
Input validation
C.
Code signing
Answers
C.
Code signing
D.
Secure cookies
Answers
D.
Secure cookies
Suggested answer: B

Explanation:

Input validation is a technique that involves checking the user input for any malicious or unexpected characters or commands that could be used to perform SQL injection attacks. Input validation can be done by using allow-lists or deny-lists to filter out the input based on predefined criteria. Input validation can prevent SQL injection attacks by ensuring that only valid and expected input is passed to the database queries.

asked 02/10/2024
Tanvir Anjum
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first