Which of the following methods can limit the potential damage of SQL Injection attacks?
1) Only use Structured Query Language (SQL) on read-only flat files.
2) Limit the login permissions of the web application's database
3) Enable SSL or IPSec communications on the connection to the database.
4) Use firewalls to allow the web application to the database port.