Multiple Choice
A penetration tester was able to enter an SQL injection command into a text box and gain access to the information store on the database. Which of the following is the BEST recommendation that would mitigate the vulnerability?
A) Randomize the credentials used to log in.
B) Install host-based intrusion detection.
C) Implement input normalization.
D) Perform system hardening.
Correct Answer:

Verified
Correct Answer:
Verified
Q103: A penetration tester is attempting to open
Q104: A penetration tester is performing a wireless
Q105: Which of the following commands would allow
Q106: A penetration tester is performing a remote
Q107: Click the exhibit button. <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1257/.jpg" alt="Click
Q109: Which of the following types of intrusion
Q110: A security consultant receives a document outlining
Q111: A penetration tester ran an Nmap scan
Q112: A client requests that a penetration tester
Q113: A penetration tester, who is not on