Which of the following mitigation strategies would be BEST to prevent this attack from being successful?

Posted by: Pdfprep Category: SY0-601 Tags: , ,

A security analyst sees the following log output while reviewing web logs:

Which of the following mitigation strategies would be BEST to prevent this attack from being successful?
A . Secure cookies
B . Input validation
C . Code signing
D . Stored procedures

Answer: B

Leave a Reply

Your email address will not be published.