Question: Question 45 SQL injection attacks are impossible if the web application uses TLS for all pages. True False 10 points Question 46 SQL injection attacks
Question 45
SQL injection attacks are impossible if the web application uses TLS for all pages.
True
False
10 points
Question 46
SQL injection attacks can be prevented by JavaScript form validation.
True
False
10 points
Question 47
"When a web server accesses a database server using the MySQL protocol via an SSL tunnel, which protocol is the encapsulating protocol?"
| IP | ||
| TCP | ||
| SSL | ||
| MySQL |
10 points
Question 48
"Alice, Bob, Claire, and Dan communicate via public key cryptography. Each pair does not want the other persons to be able to see their private communications, i.e. Alice and Bob want to communicate without Claire or Dan being able to read their messages. How many different secret keys does this group need?"
| 1 | ||
| 4 | ||
| 6 | ||
| 8 |
10 points
Question 49
Which of the following is the most secure input validation technique?
| Indirect selection | ||
| Blacklist | ||
| Whitelist | ||
| White box |
10 points
Question 50
What are the two things that can be reduced to improve security when producing a system. Select exactly two answers.
| Exploits | ||
| Vulnerabilities | ||
| Attack surface | ||
| Malware |
10 points
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
