Which one of the following choices best describes data tainting?
A.
Tainted data can be used by eval, system, or exec.
B.
Tainted data cannot be accessed by the script.
C.
Variables containing external data cannot be used outside the script.
D.
Data tainting is enabled using the -D switch.