23. Which of the following techniques can be used to help prevent SQL injection attacks?
(A) Concatenating user input with SQL queries.
(B) Using stored procedures.
(C) Storing sensitive data in plain text.
(D) Creating complex table names.
(E) Ignoring input validation.
答案:登入後查看
統計: 尚無統計資料
統計: 尚無統計資料