View the Exhibit and examine the procedure to create a trigger name based on the table name supplied to the procedure.
Which three statements are appropriate for protecting the code in the procedure from SQL
injection? (Choose three.)
A.
Explicitly validate the identifier length limit.
B.
Add AUTHID DEFINER to the definition of the procedure.
C.
Use PRAGMA RESTRICT_REFERENCES in the procedure.
D.
Filter out control characters in user-supplied identifier names.
E.
Use the object ID of the table from the data dictionary to build the trigger name.
A , D , E