You wish to protect your MySQL database against SQL injection attacks.
Which method would fail to do this?
On examination, your MySQL installation datadir has become recursively world read/write/executable.
What are two major concerns of running an installation with incorrect file privileges? (Choose two.)