
Ultimate access to all questions.
In specifying security requirements for a web workload, what are the critical security controls you would recommend to protect against common web application vulnerabilities such as SQL injection, cross-site scripting (XSS), and distributed denial-of-service (DDoS) attacks?
A
Implement input validation, output encoding, web application firewall (WAF), and DDoS mitigation strategies.
B
Use no input validation, no output encoding, no WAF, and no DDoS mitigation.
C
Implement weak input validation, partial output encoding, basic WAF, and minimal DDoS mitigation.
D
Use token-based input validation, full output encoding, advanced WAF, but no DDoS mitigation.