exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 218 discussion

Actual exam question from CompTIA's PT0-002
Question #: 218
Topic #: 1
[All PT0-002 Questions]

A penetration tester found several critical SQL injection vulnerabilities during an assessment of a client's system. The tester would like to suggest mitigation to the client as soon as possible.
Which of the following remediation techniques would be the BEST to recommend? (Choose two.)

  • A. Closing open services
  • B. Encryption users' passwords
  • C. Randomizing users' credentials
  • D. Users' input validation
  • E. Parameterized queries
  • F. Output encoding
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
masso435
Highly Voted 2 years, 5 months ago
D and E
upvoted 18 times
...
2Fish
Highly Voted 2 years, 3 months ago
D and E, "Choose Two"
upvoted 9 times
...
ariel004
Most Recent 9 months, 2 weeks ago
D and E
upvoted 1 times
...
FasterN8
10 months ago
Selected Answer: E
DE easy
upvoted 1 times
...
djash22
10 months, 1 week ago
best recommendations for immediate remediation of SQL injection vulnerabilities are D. Users' input validation and E. Parameterized queries. These directly prevent the exploitation of SQL code through user inputs, significantly reducing the risk of SQL injection. D&E
upvoted 1 times
...
pepgua
11 months, 1 week ago
The two BEST recommendations for mitigating SQL injection vulnerabilities are: D. Users' input validation: This technique involves thoroughly sanitizing all user input before it's used in SQL queries. This can be achieved by: Removing special characters that might be interpreted as SQL commands (e.g., apostrophes, semicolons, hyphens). Escaping any remaining special characters that are necessary for the input but could be misinterpreted in SQL (e.g., backslashes before apostrophes). Using whitelisting to restrict user input to a predefined set of allowed values. E. Parameterized queries: This approach separates the SQL query structure from the user input. Placeholder values are used in the query, and the user input is bound to these placeholders separately. This prevents malicious code from being injected into the actual SQL statement.
upvoted 1 times
...
PMann
1 year, 1 month ago
D && E
upvoted 1 times
...
r3vrnd
1 year, 2 months ago
hahaha says choose 2 then only provides 1 answer. FAIL Answer D and E
upvoted 1 times
...
Big_Dre
1 year, 2 months ago
Selected Answer: D
obviously
upvoted 1 times
...
mehewas855
1 year, 5 months ago
Selected Answer: E
DE DE DE
upvoted 1 times
...
hamz1999
1 year, 5 months ago
Selected Answer: E
D and E
upvoted 1 times
...
[Removed]
1 year, 5 months ago
Selected Answer: D
D and E. Choose two
upvoted 1 times
...
Ahegi
1 year, 7 months ago
Selected Answer: E
D and E
upvoted 1 times
...
solutionz
1 year, 9 months ago
Selected Answer: D
To mitigate SQL injection vulnerabilities, the best remediation techniques generally involve handling user input securely and managing how queries are constructed. Therefore, the best recommendations from the given options would be: D. Users' input validation E. Parameterized queries
upvoted 2 times
...
kloug
2 years, 2 months ago
deeeeee
upvoted 5 times
...
zimuz
2 years, 3 months ago
Selected Answer: D
should be 2 answers so d and e
upvoted 6 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago