Which three statements are appropriate for protecting the code in the procedure from SQL injection?

View the Exhibit and examine the procedure to create a trigger name based on the table name
supplied to the procedure.

Which three statements are appropriate for protecting the code in the procedure from SQL
injection? (Choose three.)

View the Exhibit and examine the procedure to create a trigger name based on the table name
supplied to the procedure.

Which three statements are appropriate for protecting the code in the procedure from SQL
injection? (Choose three.)

A.
Explicitly validate the identifier length limit.

B.
Add AUTHID DEFINER to the definition of the procedure.

C.
Use PRAGMA RESTRICT_REFERENCES in the procedure.

D.
Filter out control characters in user-supplied identifier names.

E.
Use the object ID of the table from the data dictionary to build the trigger name.



Leave a Reply 1

Your email address will not be published. Required fields are marked *