Author Question: In a SQL injection attack, attackers may use lookup commands to obtain unauthorized information. ... (Read 27 times)

123654777

  • Hero Member
  • *****
  • Posts: 585
In a SQL injection attack, attackers may use lookup commands to obtain unauthorized information.
 
  Indicate whether the statement is true or false.

Question 2

For all applications, a basic rule is ________.
 
  A) always trust user input
  B) sometimes trust user input
  C) never trust user input
  D) None of the above



voltaire123

  • Sr. Member
  • ****
  • Posts: 301
Answer to Question 1

Answer: TRUE

Answer to Question 2

Answer: C



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Despite claims by manufacturers, the supplement known as Ginkgo biloba was shown in a study of more than 3,000 participants to be ineffective in reducing development of dementia and Alzheimer’s disease in older people.

Did you know?

The term pharmacology is derived from the Greek words pharmakon("claim, medicine, poison, or remedy") and logos ("study").

Did you know?

According to the American College of Allergy, Asthma & Immunology, more than 50 million Americans have some kind of food allergy. Food allergies affect between 4 and 6% of children, and 4% of adults, according to the CDC. The most common food allergies include shellfish, peanuts, walnuts, fish, eggs, milk, and soy.

Did you know?

The people with the highest levels of LDL are Mexican American males and non-Hispanic black females.

Did you know?

Asthma is the most common chronic childhood disease in the world. Most children who develop asthma have symptoms before they are 5 years old.

For a complete list of videos, visit our video library