Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Exam 312-50v13 All Questions
Exam 312-50v13 All Questions

View all questions & answers for the 312-50v13 exam

ECCouncil CEH v13 312-50v13 Question # 134 Topic 14 Discussion

312-50v13 Exam Topic 14 Question 134 Discussion:
Question #: 134
Topic #: 14

CyberTech Inc. recently experienced SQL injection attacks on its official website. The company appointed Bob, a security professional, to build and incorporate defensive strategies against such attacks. Bob adopted a practice whereby only a list of entities such as the data type, range, size, and value, which have been approved for secured access, is accepted. What is the defensive technique employed by Bob in the above scenario?


A.

Output encoding


B.

Enforce least privileges


C.

Whitelist validation


D.

Blacklist validation


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.