A security consultant is evaluating forms which will be used on a company website. Which of the
following techniques or terms is MOST effective at preventing malicious individuals from
successfully exploiting programming flaws in the website?
A.
Anti-spam software
B.
Application sandboxing
C.
Data loss prevention
D.
Input validation