Identify two methods for immunizing PL/SQL code against SQL injection attacks. (Choose two.)
A.
Use bind arguments.
B.
Validate all input concatenated to dynamic SQL.
C.
Use dynamic SQLs constructed using concatenation of input values.
D.
Use subprograms as part of packages instead of stand-alone subprograms.
A,B