Which of the following BEST describes a protective countermeasure for SQL injection?
A.
Eliminating cross-site scripting vulnerabilities
B.
Installing an IDS to monitor network traffic
C.
Validating user input in web applications
D.
Placing a firewall between the Internet and database servers