Which SQL injection defense method should be used only as a last resort?
- escaping all user-supplied input
- using a database firewall
- implementing whitelist input validation
- using parameterized queries
Exam with this question: DevNet Associate Course Final Exam Answers
Please login or Register to submit your answer