A web application has been found to be vulnerable to a SQL injection attack. Which of the following BEST describes the required remediation action?
A.
Change the server’s SSL key and add the previous key to the CRL.
B.
Install a host-based firewall.
C.
Install missing security updates for the operating system.
D.
Add input validation to forms.