You have determined that the company Web server has several vulnerabilities, including a buffer overflow that has resulted in an attack. The Web server uses PHP and has direct connections to an Oracle database server. It also uses many CGI scripts. Which of the following is the most effective way to respond to this attack?
A.
Installing software updates for the Web server daemon
B.
Using the POST method instead of the GET method for a Web form
C.
Installing an intrusion detection service to monitor logins
D.
Using the GET method instead of the POST method for a Web form