What methods do you follow to protect from sql injection attack?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More SQL Server Interview Questions

What is the difference between the 2 operating modes of database mirroring?

0 Answers  


What is the system function to get the current user's user id?

3 Answers   TCS,


What is in place upgrade in sql server?

0 Answers  


Explain the concepts and capabilities of sql server?

0 Answers  


How to edit table in sql server 2017?

0 Answers  






Why I have to use stored procedures?

0 Answers   Cognizant,


explain extended properties

0 Answers  


What is scan table/view and seek table/view when its occurs? : sql server database administration

0 Answers  


What is policy management?

0 Answers  


What command is used to delete a table from the database in the sql server and how?

0 Answers  


1. Tell me your daily activities 2. If sql server installation fails at time installation what will do 3. Where does the sql server installation log details are stored 4. After the installation what will you do for memory configuration 5. What is the difference between SQL max maximum memory and AWE memory 6. How will you configure AWE memory 7. How will setup an email alert for the backup job 8. After the SQL installation what are the jobs will you configure 9. What does –g mean in the sql startup parameter 10. What is the difference between Bulked log and Full recovery model 11. What is the difference between mirroring and log shipping 12. What are the steps to be followed before in-place up gradation 13. After installing the patch the sql server does not start and application team tells to rollback the changes .In this scenario what will you do

0 Answers   CSC, IBM,


What the different components in replication and what is their use?

0 Answers  


Categories