You are conducting security testing on a database application. You discover that the application is vulnerable to SQL injection attacks. What should be the immediate action to mitigate this vulnerability?
- Escaping Special Characters
- Implementing Encryption
- Input Validation
- Use of Prepared Statements
Use of Prepared Statements
Loading...
Related Quiz
- During ETL testing, data validation ensures that the data is accurate, consistent, and free from ____________.
- Which technique is used to compare data between the source and target systems in ETL testing?
- What is the role of access control lists (ACLs) in database security?
- A SQL ____________ is a query embedded within another query.
- What impact can inadequate database testing have on an organization's reputation and business operations?