Processes that take client input, perform functions on the Web server and then return content to the Web browser are known as:
Which of the following will best protect a server from Web server vulnerabilities that are exploited by hackers?