Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 350-901 Topic 5 Question 60 Discussion

Actual exam question for Cisco's 350-901 exam
Question #: 60
Topic #: 5
[All 350-901 Questions]

Refer to the exhibit.

Refer to the exhibit A script returns the location of a specific access point when given the access point name If a user enters a search value such as DROP TABLE access points then the entire table is removed. What must be added to the box where the code is missing to prevent a SQL injection attack?

A)

B)

C)

D)

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Eladia
1 months ago
I'm pretty sure the answer is Option B. Parameterized queries are the way to go, unless you're a fan of accidentally deleting your entire database.
upvoted 0 times
...
Emilio
1 months ago
Hold up, is this a trick question? I bet the answer is Option C - 'DROP TABLE access points' is the perfect way to ensure no one can access those pesky access points!
upvoted 0 times
...
Lashandra
1 months ago
Hmm, I'm going to have to go with Option D. After all, what could go wrong with a good old-fashioned 'DROP TABLE' statement?
upvoted 0 times
Onita
4 days ago
User1: Maybe we should consider a safer option like Option C.
upvoted 0 times
...
Scarlet
8 days ago
User2: I agree, it could lead to unintended consequences.
upvoted 0 times
...
Brandon
19 days ago
User1: Are you sure about that? 'DROP TABLE' sounds risky.
upvoted 0 times
...
...
Idella
2 months ago
I'm not sure about this one. Options A and C both seem like they could be valid ways to sanitize the input.
upvoted 0 times
Nguyet
3 days ago
Good choice, Option A is the best way to prevent SQL injection in this scenario.
upvoted 0 times
...
Alaine
9 days ago
I see, thanks for the clarification. I'll go with Option A then.
upvoted 0 times
...
Jettie
28 days ago
User2: I agree, option C looks like the most secure way to sanitize the input.
upvoted 0 times
...
Jose
1 months ago
Option A is the correct choice. It uses parameterized queries to prevent SQL injection.
upvoted 0 times
...
Shawna
2 months ago
User1: I think option C is the best choice to prevent SQL injection.
upvoted 0 times
...
...
Beata
2 months ago
I'm not sure, but I think I'll go with Option C as well based on what Evangelina and Glory said.
upvoted 0 times
...
Regenia
2 months ago
Option B looks like the way to go. Parameterized queries are the best way to prevent SQL injection attacks.
upvoted 0 times
Linwood
1 months ago
Option B is the safest bet to prevent any potential SQL injection vulnerabilities.
upvoted 0 times
...
Rochell
2 months ago
Always important to prioritize security when writing code.
upvoted 0 times
...
Tatum
2 months ago
Parameterized queries definitely help prevent SQL injection attacks.
upvoted 0 times
...
Samira
2 months ago
I agree, option B with parameterized queries is the best choice.
upvoted 0 times
...
...
Glory
2 months ago
I agree with Evangelina, Option C seems like the best choice to prevent SQL injection in this scenario.
upvoted 0 times
...
Evangelina
3 months ago
I think the answer is C) Option C because it looks like it adds a parameterized query to prevent SQL injection.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77