To identify improper database coding integration and any potential ____ security scans are utilized?

48. To identify improper database coding integration and any potential ____ security scans are utilized?

  1. Malformed XML
  2. Boundary scan
  3. SQL injection
  4. XML Bomb
  5. Cross-site scripting

Answer: B) SQL injection

Explanation:

To identify improper database coding integration and any potential SQL injection security scans are utilized.

Comments and Discussions!

Load comments ↻






Copyright © 2024 www.includehelp.com. All rights reserved.