Which SQL injection defense method should be used only as a last resort?

IT Questions BankCategory: DevNetWhich SQL injection defense method should be used only as a last resort?

Which SQL injection defense method should be used only as a last resort?

  • escaping all user-supplied input
  • using a database firewall
  • implementing whitelist input validation
  • using parameterized queries

Exam with this question: DevNet Associate Course Final Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments