A security analyst accesses corporate web pages and inputs random data in the forms. The response received includes the type of database used and SQL commands that the database accepts. Which of the following should the security analyst use to prevent this vulnerability?
A) Application fuzzing
B) Error handling
C) Input validation
D) Pointer dereference
Correct Answer:
Verified
Q96: A system's administrator has finished configuring firewall
Q97: A Chief Executive Officer (CEO) suspects someone
Q98: A security administrator suspects a MITM attack
Q99: A security analyst notices anomalous activity coming
Q100: An audit takes place after company-wide restricting,
Q102: A portable data storage device has been
Q103: A security administrator returning from a short
Q104: A network administrator wants to ensure that
Q105: An attacker discovers a new vulnerability in
Q106: A web application is configured to target
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents