66.
Input validation is used to prevent which of the following?
- A.Bad input
- B.Formatting issues
- C.Language issues
- D.SQL injection
- Answer & Explanation
- Report
Answer : [A,D]
Explanation :
Explanation :
Input validation is intended to prevent the submission of bad input into an application, which could allow SQL injection to take place. |
67.
Web applications are used to __________.
- A.Provide dynamic content
- B.Stream video
- C.Apply scripting
- D.Implement security controls
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Web applications are ideally suited for providing dynamic content of all types. Although some of this can be done on the client side, there is much more power and capability on the server side. |
68.
Which of the following challenges can be solved by firewalls?
- A.Protection against buffer overflows
- B.Protection against scanning
- C.Enforcement of privileges
- D.Ability to use nonstandard ports
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Firewalls can prevent the scanning of systems and the probing or discovery of a database. |
69.
Databases can be a victim of code exploits depending on which of the following?
- A.Configuration
- B.Vendor
- C.Patches
- D.Client version
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Databases can be a victim of source code exploits, depending on their configuration and design. |
70.
In addition to relational databases, there is also what kind of database?
- A.Hierarchical
- B.SQL
- C.ODBC
- D.Structured
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
A hierarchical database is an alternative to the popular relational database structure. |
- Pages
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40