Author Question: In a SQL injection attack, attackers may use lookup commands to obtain unauthorized information. ... (Read 54 times)

123654777

  • Hero Member
  • *****
  • Posts: 585
In a SQL injection attack, attackers may use lookup commands to obtain unauthorized information.
 
  Indicate whether the statement is true or false.

Question 2

For all applications, a basic rule is ________.
 
  A) always trust user input
  B) sometimes trust user input
  C) never trust user input
  D) None of the above



voltaire123

  • Sr. Member
  • ****
  • Posts: 301
Answer to Question 1

Answer: TRUE

Answer to Question 2

Answer: C



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Street names for barbiturates include reds, red devils, yellow jackets, blue heavens, Christmas trees, and rainbows. They are commonly referred to as downers.

Did you know?

A cataract is a clouding of the eyes' natural lens. As we age, some clouding of the lens may occur. The first sign of a cataract is usually blurry vision. Although glasses and other visual aids may at first help a person with cataracts, surgery may become inevitable. Cataract surgery is very successful in restoring vision, and it is the most frequently performed surgery in the United States.

Did you know?

The term bacteria was devised in the 19th century by German biologist Ferdinand Cohn. He based it on the Greek word "bakterion" meaning a small rod or staff. Cohn is considered to be the father of modern bacteriology.

Did you know?

Oxytocin is recommended only for pregnancies that have a medical reason for inducing labor (such as eclampsia) and is not recommended for elective procedures or for making the birthing process more convenient.

Did you know?

In 1844, Charles Goodyear obtained the first patent for a rubber condom.

For a complete list of videos, visit our video library