Which of the following actions would help prevent SQL injection on a web application?

A.
Blocking direct access to the SQL server’s management port
B.
Using exception handling to detect buffer overflows
C.
Validating client input inside the application’s source code
D.
Regularly applying patches to the database management system
Performing input validation lets you limit the types of data a user provides in a form. There are numerous variations of input injection or manipulations attacks that require a broad-spectrum defense approach, including whitelisting and blacklisting filters.
0
0