Author Question: In a SQL injection attack, attackers may use lookup commands to obtain unauthorized information. ... (Read 26 times)

123654777

  • Hero Member
  • *****
  • Posts: 585
In a SQL injection attack, attackers may use lookup commands to obtain unauthorized information.
 
  Indicate whether the statement is true or false.

Question 2

For all applications, a basic rule is ________.
 
  A) always trust user input
  B) sometimes trust user input
  C) never trust user input
  D) None of the above



voltaire123

  • Sr. Member
  • ****
  • Posts: 301
Answer to Question 1

Answer: TRUE

Answer to Question 2

Answer: C



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Illicit drug use costs the United States approximately $181 billion every year.

Did you know?

All patients with hyperparathyroidism will develop osteoporosis. The parathyroid glands maintain blood calcium within the normal range. All patients with this disease will continue to lose calcium from their bones every day, and there is no way to prevent the development of osteoporosis as a result.

Did you know?

The most dangerous mercury compound, dimethyl mercury, is so toxic that even a few microliters spilled on the skin can cause death. Mercury has been shown to accumulate in higher amounts in the following types of fish than other types: swordfish, shark, mackerel, tilefish, crab, and tuna.

Did you know?

Many of the drugs used by neuroscientists are derived from toxic plants and venomous animals (such as snakes, spiders, snails, and puffer fish).

Did you know?

Drug-induced pharmacodynamic effects manifested in older adults include drug-induced renal toxicity, which can be a major factor when these adults are experiencing other kidney problems.

For a complete list of videos, visit our video library