Which of the following processes is an efficient way of restricting malicious input?

Posted by: Pdfprep Category: 312-50v10 Tags: , ,

While performing data validation of web content, a security technician is required to restrict malicious input.

Which of the following processes is an efficient way of restricting malicious input?
A . Validate web content input for query strings.
B . Validate web content input with scanning tools.
C . Validate web content input for type, length, and range.
D . Validate web content input for extraneous queries.

Answer: C

Leave a Reply

Your email address will not be published.