Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 312-50v11 Topic 1 Question 68 Discussion

Actual exam question for Eccouncil's 312-50v11 exam
Question #: 68
Topic #: 1
[All 312-50v11 Questions]

Take a look at the following attack on a Web Server using obstructed URL:

How would you protect from these attacks?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Beatriz
10 months ago
Eve: Blacklisting could work too, but whitelist validation is more secure as it only allows approved entities.
upvoted 0 times
...
Denny
10 months ago
David: But couldn't blacklisting be another option to prevent unauthorized access?
upvoted 0 times
...
Belen
10 months ago
I agree with whitelist validation is a good way to prevent SQL injection attacks.
upvoted 0 times
...
Doretha
10 months ago
I believe it's whitelist validation because he only allows approved entities for access.
upvoted 0 times
...
Oren
11 months ago
I think the defensive technique used by Bob is output encoding.
upvoted 0 times
...
Jame
11 months ago
Eve: Blacklisting could work too, but whitelist validation is more secure as it only allows approved entities.
upvoted 0 times
...
Aileen
11 months ago
David: But couldn't blacklisting be another option to prevent unauthorized access?
upvoted 0 times
...
Valentin
11 months ago
I agree with whitelist validation is a good way to prevent SQL injection attacks.
upvoted 0 times
...
Jeffrey
11 months ago
I believe it's whitelist validation because he only allows approved entities for access.
upvoted 0 times
...
Kayleigh
12 months ago
I think the defensive technique used by Bob is output encoding.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77