The IT team is setting up and deploying a number of new comp…

The IT team is setting up and deploying a number of new computers across the enterprise. The IT manager wants to ensure consistent and secure setup of these systems and has distributed a list of specific settings that each member of the team must follow. Which of the following mitigation technique BEST describes the manager’s actions

While reviewing a database server log, you notice several qu…

While reviewing a database server log, you notice several queries that successfully returned the contents of the table named ‘TBL_employees’. Authorized users perform this query on a regular basis, however, the queries in question are using a malformed query string that includes “1=1”. Which of the following vulnerabilities were exploited