Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

You wish to protect your MySQL database against SQL injection attacks.

Which method would fail to do this?

A.

installing and configuring the Connection Control plugin

B.

avoiding concatenation of SQL statements and user-supplied values in an application

C.

using stored procedures for any database access

D.

using PREPARED STATEMENTS

On examination, your MySQL installation datadir has become recursively world read/write/executable.

What are two major concerns of running an installation with incorrect file privileges? (Choose two.)

A.

Users could overwrite configuration files.

B.

Data files could be deleted.

C.

SQL injections could be used to insert bad data into the database.

D.

MySQL binaries could be damaged, deleted, or altered.

E.

Extra startup time would be required for the MySQL server to reset the privileges.