nerdexam
EC-CouncilEC-Council

312-50V12 · Question #127

312-50V12 Question #127: Real Exam Question with Answer & Explanation

The correct answer is A: Whitelist validation. In whitelist validation, only the inputs that have been explicitly allowed are accepted, and all other inputs are rejected. This technique involves specifying a list of entities such as the data type, range, size, and value, which have been approved for secure access. Any input t

Submitted by krish.m· Mar 4, 2026Web Application Hacking

Question

CyberTech Inc. recently experienced SQL injection attacks on its official website. The company appointed Bob, a security professional, to build and incorporate defensive strategies against such attacks. Bob adopted a practice whereby only a list of entities such as the data type, range, size, and value, which have been approved for secured access, is accepted. What is the defensive technique employed by Bob in the above scenario?

Options

  • AWhitelist validation
  • BOutput encoding
  • CBlacklist validation
  • DEnforce least privileges

Explanation

In whitelist validation, only the inputs that have been explicitly allowed are accepted, and all other inputs are rejected. This technique involves specifying a list of entities such as the data type, range, size, and value, which have been approved for secure access. Any input that is not on the list is rejected, preventing attacks such as SQL injection, where an attacker attempts to inject malicious code into an application by exploiting vulnerabilities in user input fields.

Topics

#SQL injection prevention#whitelist validation#input validation#web application security

Community Discussion

No community discussion yet for this question.

Full 312-50V12 PracticeBrowse All 312-50V12 Questions