Free CompTIA CySA+ CS0-003 Practice Question

When reviewing the source code of a web application, you come across a function that interacts directly with the database using user-supplied input without proper sanitation. Which of the following practices is the BEST to recommend to the development team to mitigate the risk associated with this kind of vulnerability?

  • Encrypting user input before including it in database queries

  • Employ input length restrictions for all user-supplied input fields

  • Client-side input validation

  • Use parameterized queries for database access

This question's topic:
CompTIA CySA+ CS0-003 / 
Vulnerability Management
Your Score:

Check or uncheck an objective to set which questions you will receive.