exam questions

Exam 350-901 All Questions

View all questions & answers for the 350-901 exam

Exam 350-901 topic 1 question 168 discussion

Actual exam question from Cisco's 350-901
Question #: 168
Topic #: 1
[All 350-901 Questions]

Which two techniques protect against injection attacks? (Choose two.)

  • A. input validation
  • B. trim whitespace
  • C. limit text areas to 255 characters
  • D. string escaping of user free text and data entry
  • E. only use dropdown, checkbox, and radio button fields
Show Suggested Answer Hide Answer
Suggested Answer: AD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Writer
Highly Voted 2 years, 11 months ago
I think A D E - using dropdown only in fixed set of values
upvoted 23 times
...
psyborg
Highly Voted 2 years, 5 months ago
A and D Elimination: B. Trim whitespace > whitespace is not the issue with injection attacks C. limit text areas to 255 characters > You could perform an injection with less than 255 characters. E. only use dropdown, checkbox, and radio button fields > This is client side code that prevents users to inject via a browser, but does not prevent a scripted attack.
upvoted 10 times
...
Teringzooi
Most Recent 7 months, 3 weeks ago
Selected Answer: AD
Correct answers: A & D Against injection attacks: - Escaping Inputs/Sanitizing Inputs - Principle of Least Privilege - Parameterized queries and prepared statements - Prevent all SQL-generated error messages from being displayed to the end user - Password Hashing - Third Party Authentication - Data validation process to assess data against a set of rules - Intrusion prevention system (IPS) or a next-generation firewall (NGFW)
upvoted 3 times
...
designated
8 months, 4 weeks ago
Selected Answer: AD
A and D are correct The following defense methods are available: - Escaping Inputs/Sanitizing Inputs - Principle of Least Privilege - Parameterized queries and prepared statements - Prevent all SQL-generated error messages from being displayed to the end user - Password Hashing - Third Party Authentication - Data validation process to assess data against a set of rules - Intrusion prevention system (IPS) or a next-generation firewall (NGFW)
upvoted 2 times
...
QuiShong
11 months, 1 week ago
Selected Answer: AD
A and D, dropdowns don't protect, they merely limit input, but can be ignored if you know what you are doing (like pressing F12)
upvoted 2 times
...
__al__
1 year, 1 month ago
Selected Answer: AD
a, d ...
upvoted 2 times
...
Bloody_sausage
2 years, 6 months ago
It's A and D. Reference: https://www.hacksplaining.com/prevention/sql-injection
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago