A security analyst accesses corporate web pages and inputs random data in the forms. The response received includes the type of
database used and SQL commands that the database accepts. Which of the following should the security analyst use to prevent this vulnerability? A. Application fuzzing
B. Error handling
C. Input validation
D. Pointer dereference
Option c is the correct answer for the above question.
Explanation:
The vulnerability is a term that is used to state that any system has some limitation by which the system causes an error while performing the action.
The above question states a software and asked the action which is used by the analyst to prevent the limitation. So the system will use the input validation.
It is because this prevents the error. it is because this will help to proceed with the wrong or invalid information on the database and the database or system can not hold the wrong data.
Hence option c is the correct answer while the other option is not correct because other options can not able to fix the limitation of the above system.
The main function you will use is.... Type SUM= in all caps into a cell and then you can control click cells to add them together. You can also add PEMDAS properties to do calculations withing it.