CyberTech Inc. recently experienced SQL injection attacks on its official website. The company appointed Bob, a security professional, to build and incorporate defensive strategies against such attacks. Bob adopted a practice whereby only a list of entities such as the data type, range, size, and value, which have been approved for secured access, is accepted.What is the defensive technique employed by Bob in the above scenario?
A. Whitelist validation
B. Output encoding
C. Blacklist validation
D. Enforce least privileges
CyberTech Inc. recently experienced SQL injection attacks on its official website. The company appointed Bob, a security
-
- Site Admin
- Posts: 346795
- Joined: Mon May 16, 2022 9:31 am
CyberTech Inc. recently experienced SQL injection attacks on its official website. The company appointed Bob, a security
Register to view solutions, replies, and use search function. Request answer by replying! For more answers visit our other sites: AnswerAccurate HomeworkAnswerHelp AnswerHappy and QuestionAnswerDump