in Technology by

The approach to input validation that simply encodes characters considered "bad" to a format which should not affect the functionality of the application and hence is very weak

(1)Encrypt bad

(2)Backlisting

(3)Encode bad

1 Answer

0 votes
by
Correct answer:-(3)Encode bad

Related questions

0 votes
    The _______ approach to validation only permits characters/ASCII ranges defined within a white-list. (1)Encode good (2)Known bad (3)Known good...
asked May 17, 2021 in Technology by JackTerrance
0 votes
    I want to load Google fonts in the head-section of my page using a php-function. My -area looks like this: ... ... Now ... I do this, there will be a "1" displayed (because of the...
asked Jun 2, 2022 in Education by JackTerrance
0 votes
    I want to load Google fonts in the head-section of my page using a php-function. My -area looks like this: ... ... Now ... I do this, there will be a "1" displayed (because of the...
asked May 30, 2022 in Education by JackTerrance
0 votes
    I want to load Google fonts in the head-section of my page using a php-function. My -area looks like this: ... ... Now ... I do this, there will be a "1" displayed (because of the...
asked May 26, 2022 in Education by JackTerrance
0 votes
    I want to load Google fonts in the head-section of my page using a php-function. My -area looks like this: ... ... Now ... I do this, there will be a "1" displayed (because of the...
asked May 17, 2022 in Education by JackTerrance
0 votes
    The transaction can no longer continue with its normal execution because of some internal condition, such ... topic in chapter Recovery System of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    Securing a database application with username/password access control should be considered sufficient: Please select the ... have administrative access (d)To secure the application...
asked Dec 11, 2020 in Education by Editorial Staff
0 votes
    In the design of a simply supported skew bridge, which direction of reinforcement should be provided?...
asked Jan 3, 2021 in Education by JackTerrance
0 votes
    Existing customers are unlikely to have G T opportunities, hence we should focus primarily on new customers. (1)True (2)False...
asked Sep 21, 2021 in Technology by JackTerrance
0 votes
    In an application currently in production, one module of code is being modified. Is it necessary to re-test ... it enough to just test functionality associated with that module?...
asked Oct 17, 2020 in Technology by anonymous
0 votes
    Which of the following threats is most likely to be caused by poor input validation? 1. Insecure direct object ... protection 3. Insecure cryptographic storage 4.Enabling of IPSec...
asked Mar 20, 2021 in Technology by JackTerrance
0 votes
    __________________ are those search engines that are intended and designed not to take our searched data or browsing habits ... mode 3) In-private mode 4) Private search engines...
asked Dec 29, 2020 in Technology by JackTerrance
0 votes
    What is the purpose of data format validation? (a) Data correctness (b) Mere data existence (c) ... JavaScript Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Oct 22, 2021 in Education by JackTerrance
...