Question: PLEASE ASAP Assuming the following Java servlet code generates query. There is an SQL injection vulnerablity in the generated query (qry). Which of the variable

PLEASE ASAP
PLEASE ASAP Assuming the following Java servlet code generates query. There is
an SQL injection vulnerablity in the generated query (qry). Which of the

Assuming the following Java servlet code generates query. There is an SQL injection vulnerablity in the generated query (qry). Which of the variable would be responsible for the SQL injection attack? String LoginAction (HttpServletRequest request, ...) throws IOException \{ String sLogin = getParam(request, "Login"): String table = "members"; String col1 = "member_id"; String qry = "select " + col 1+ ", member_level from " + table + " where " + "member_login =" " + sLogin + "w"; col1 table sLogin none of the above PreparedStatement can be used to remove SQL Injection from Java code. Below is the statement of a Java query that takes an input (user) and needs to be transalted to PreparedStatement to secure. String qry = "select from t1 where uid =+ user +; Which of the following statement(s) convert above query into a safe query? See Java manual on PreparedStatement at http://docs.oracle.com/javase/7/docs/api/java/sql/PreparedStatement.html Preparedstatement ps = conn. preparestatenent ( select * fron t1 where uide P"); Preparedstatement ps - conn, preparestatement ( select * from t1 where uidi* + user )j; Preparedstatement iss = conn. preparestatement ( select - fron t1 where uld ?") ; psisetstring(1, user); none of the above

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!