READ Free Dumps For Oracle- 1z0-146
Question ID 2847 | Which two are major approaches that can be used to reduce the SQL injection by limiting user input? (Choose two.) |
Option A | A. Restrict users accessing specified web page. |
Option B | B. Use NUMBER data type if only positive integers are needed. |
Option C | C. Use dynamic SQL and construct it through concatenation of input values. |
Option D | D. In PL/SQL API, expose only those routines that are intended for customer use. |
Correct Answer | A,D |
Question ID 2848 | Which three actions can be performed by using the DBMS_ASSERT package to prevent SQL injection? (Choose three.) |
Option A | A. Detect a wrong user. |
Option B | B. Check input string length. |
Option C | C. Verify qualified SQL names. |
Option D | D. Validate TNS connect strings. |
Option E | E. Verify an existing schema name. |
Option F | F. Enclose string literals within double quotation marks. |
Correct Answer | C,E,F |