COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Organisation can protect themselves from SQL injection attacks by downloading and installing ____ [7-9]
A
Patches
B
Software
C
Upgrades
D
Downgrades
Explanation: 

Detailed explanation-1: -Certified Ethical Hacker (CEH).

Detailed explanation-2: -The Computer Misuse Act attempts to discourage people from using computers for illegal purposes. There are three separate parts to the Act: It is illegal to access data stored on a computer unless you have permission to do so. Unauthorised access is often referred to as hacking .

There is 1 question to complete.