READ Free Dumps For Microsoft- 70-486
Question ID 14720 | You are developing an ASP.NET MVC application that uses forms authentication. The
application uses SQL queries that display customer order data.
You need to prevent all SQL injection attacks against the application.
How should you secure the queries?
|
Option A | Implement parameterization.
|
Option B | Pattern check the input.
|
Option C | Filter out prohibited words in the input.
|
Option D | Escape single quotes on string-based input parameters.
|
Correct Answer | A |
Explanation Explanation: With most development platforms, parameterized statements that work with parameters can be used (sometimes called placeholders or bind variables) instead of embedding user input in the statement. A placeholder can only store a value of the given type and not an arbitrary SQL fragment. Hence the SQL injection would simply be treated as a strange (and probably invalid) parameter value. Reference: https://en.wikipedia.org/wiki/SQL_injection#Parameterized_statements
Question ID 14721 | You are developing an Azure worker role. You enable crash dump collection for the role.
When the role starts, an external application stops responding.
You need to download the crash dump to determine why the application stops responding.
From which two locations can you download the crash dump? Each correct answer
presents a complete solution.
|
Option A | Azure Blob storage
|
Option B | the temp folder on the virtual machine that is running the role instance
|
Option C | Azure file storage
|
Option D | the DiagnosticStore local resource folder on the virtual machine that is running the role instance
|
Correct Answer | A,D |
Explanation