A small company uses a public cloud service provider to host an online store. The online store uses a web application as the front end and a database as the backend. When a customer places an order in the web form, the request is then sent to the database to check the inventory, current price, and customer information thereby completing the order. The IT manager is learning that threat attackers may launch attacks by injecting malformed data into the web application. What is a security coding technique that the company can use to minimize such attacks?

IT Questions BankCategory: Cybersecurity EssentialsA small company uses a public cloud service provider to host an online store. The online store uses a web application as the front end and a database as the backend. When a customer places an order in the web form, the request is then sent to the database to check the inventory, current price, and customer information thereby completing the order. The IT manager is learning that threat attackers may launch attacks by injecting malformed data into the web application. What is a security coding technique that the company can use to minimize such attacks?

A small company uses a public cloud service provider to host an online store. The online store uses a web application as the front end and a database as the backend. When a customer places an order in the web form, the request is then sent to the database to check the inventory, current price, and customer information thereby completing the order. The IT manager is learning that threat attackers may launch attacks by injecting malformed data into the web application. What is a security coding technique that the company can use to minimize such attacks?

  • multi-factor authentication
  • obfuscation
  • input validation
  • encryption

Explanation: User input validation rules can help ensure the security of applications and databases by checking to see if data meets certain rules when entered into a feld in a web form. A validation rule checks that data falls within the parameters defned by the database designer. This helps to ensure the completeness, accuracy, and consistency of data.

Exam with this question: Cybersecurity Pathway Final Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments