While performing data validation of web content, a security technician is required to restrict
malicious input. Which of the following processes is an efficient way of restricting malicious input?
A.
Validate web content input for query strings.
B.
Validate web content input with scanning tools.
C.
Validate web content input for type,length,and range.
D.
Validate web content input for extraneous queries.
C