1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lapatulllka [165]
3 years ago
5

A security analyst accesses corporate web pages and inputs random data in the forms. The response received includes the type of

database used and SQL commands that the database accepts. Which of the following should the security analyst use to prevent this vulnerability?
A. Application fuzzing
B. Error handling
C. Input validation
D. Pointer dereference
Computers and Technology
1 answer:
leonid [27]3 years ago
6 0

Answer:

Option c is the correct answer for the above question.

Explanation:

  • The vulnerability is a term that is used to state that any system has some limitation by which the system causes an error while performing the action.
  • The above question states a software and asked the action which is used by the analyst to prevent the limitation. So the system will use the input validation.
  • It is because this prevents the error. it is because this will help to proceed with the wrong or invalid information on the database and the database or system can not hold the wrong data.
  • Hence option c is the correct answer while the other option is not correct because other options can not able to fix the limitation of the above system.
You might be interested in
All users at your site are using the Bash shell. You want to set a variable that will apply to every user and always have the sa
podryga [215]

Explanation:

I assume you are on a single host.

To modify the .bashrc for all NEW users, you can edit/modify (with su privilege) the file

/etc/skel/.bashrc

save the file before creating new users.

Be sure to know what you're doing, and test the file before you use it host-wide.

For existing users, you can have them do the modifications/additions individually in case they have already modified their own version.

4 0
3 years ago
I need help with this pokemon quiz question:
eduard

Answer:

a lot

Explanation:

6 0
3 years ago
Read 2 more answers
Create a conditional expression that evaluates to string "negative" if user_val is less than 0, and "non-negative" otherwise.
taurus [48]

Answer:

The modified program is as follows:

user_val = int(input())

cond_str = 'non-negative'  

if user_val < 0:

   cond_str = 'negative'  

print(user_val, 'is', cond_str)

Explanation:

This gets input for user_val

user_val = int(input())

This initializes cond_str to 'non-negative'

cond_str = 'non-negative'

If user_val is less than 0

if user_val < 0:

cond_str is updated to 'negative'

   cond_str = 'negative'  

This prints the required output

print(user_val, 'is', cond_str)

4 0
3 years ago
All of the following are properties of a relation except __________.Group of answer choicesThe order of tuples (rows) is not sig
bazaltina [42]

Answer:

D

Explanation:

All of the above are properties of a relation

3 0
2 years ago
Why was the launch of the Sputnik satellite significant in the development of computer technology?
WINSTONCH [101]
<span>A. The news of its success resulted in the U.S. funding many computer research programs.</span>
3 0
2 years ago
Read 2 more answers
Other questions:
  • Ashley wants to know the oldest form of both water purification and waste disposal. Help Ashley determine the methods. The oldes
    14·1 answer
  • In a ____ network, each computer or device is connected to multiple (sometimes all of the other) devices on the network.
    13·1 answer
  • In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?
    11·1 answer
  • Betrand Meyer developed the ______ programming language which is not type-safe because it violates the law of contravariance.
    9·1 answer
  • What is the best option for sharing Word documents on a Microsoft network because it provides finer degrees of versioning contro
    6·1 answer
  • Describe markings on a road that indicate that it is safe to pass.
    10·1 answer
  • What is an example of a hard skill?
    12·2 answers
  • Why did they removed the watch video button to view answers?​
    15·1 answer
  • Management is as old as human civilization. justify this statement​
    7·1 answer
  • What is the function of ROM?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!