PdfPrep.com

Which of the following mitigation strategies would be BEST to prevent this attack from being successful?

A security analyst sees the following log output while reviewing web logs:

Which of the following mitigation strategies would be BEST to prevent this attack from being successful?
A . Secure cookies
B . Input validation
C . Code signing
D . Stored procedures

Answer: B

Exit mobile version