Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 154 Topic 16 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 154 Topic 16 Discussion

312-50v13 Exam Topic 16 Question 154 Discussion:
Question #: 154
Topic #: 16

You are a security analyst at Sentinel Cyber Group, monitoring the web portal of Aspen Valley Bank in Salt Lake City, Utah. During log review, you notice repeated attempts by attackers to inject malicious strings into the login fields. However, despite these attempts, the application executes queries safely without altering their logic, since user inputs are kept separate from the SQL statements and bound as fixed values before execution.

Based on the observed defense mechanism, which SQL injection countermeasure is the application employing?


A.

Perform user input validation


B.

Restrict database access


C.

Encoding the single quote


D.

Use parameterized queries or prepared statements


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.