Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 228 discussion

Actual exam question from ISC's CISSP
Question #: 228
Topic #: 1
[All CISSP Questions]

In software development, developers should use which type of queries to prevent a Structured Query Language (SQL) injection?

  • A. Parameterised
  • B. Controlled
  • C. Dynamic
  • D. Static
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
459c2ae
11 months ago
I hate this question. Parameterised isn't even in the ISC2 book...ughhh
upvoted 2 times
...
Soleandheel
11 months, 2 weeks ago
A. Parameterised
upvoted 1 times
...
homeysl
1 year, 1 month ago
Selected Answer: A
OSG E9
upvoted 1 times
...
74gjd_37
1 year, 2 months ago
Selected Answer: A
Parameterised queries are a type of query in which placeholders are used for user input values. These placeholders are later replaced with user input values that are properly escaped, preventing SQL injection attacks. Parameterised queries are a recommended best practice for preventing SQL injection in software development
upvoted 2 times
...
DJOEK
1 year, 10 months ago
Selected Answer: A
A. Parameterized queries are the type of queries that developers should use to prevent a Structured Query Language (SQL) injection. Parameterized queries are pre-written SQL statements that include placeholders for user input. When a user provides input, the placeholders are replaced with the user's input, and the resulting query is executed. This helps to prevent SQL injection attacks because the user's input is treated as a separate value, rather than being interpreted as part of the SQL statement.
upvoted 4 times
jackdryan
1 year, 6 months ago
A is correct
upvoted 1 times
...
...
Ivanchun
1 year, 11 months ago
Selected Answer: A
A, separate the SQL query from the user input values
upvoted 1 times
...
rdy4u
2 years ago
Selected Answer: A
A parameterized query (also known as a prepared statement) is a means of pre-compiling a SQL statement so that all you need to supply are the "parameters" (think "variables") that need to be inserted into the statement for it to be executed. It's commonly used as a means of preventing SQL injection attacks. https://stackoverflow.com/questions/4712037/what-is-parameterized-query
upvoted 4 times
...
franbarpro
2 years, 1 month ago
Parameterized SQL queries allow you to place parameters in an SQL query instead of a constant value. A parameter takes a value only when the query is executed, which allows the query to be reused with different values and for different purposes.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...