During a security audit, it is noted that your application is vulnerable to SQL Injection
attacks. Which two in lions would you perform to address this vulnerability?
A.
Deploy the Internet facing nodes in a well defined demilitarized zone (DMZ) layer.
B.
Configure security roles in the deployment descriptor.
C.
Use parameterized stored procedures with the embedded parameters.
D.
Configure user permissions in the deployment descriptor.
E.
Add a text input validation filter to check user-supplied data.
Correct answer : CE