
Ultimate access to all questions.
You are evaluating security requirements for a web workload that handles sensitive customer data. What are the critical security controls you would recommend to protect against common web application vulnerabilities such as SQL injection, cross-site scripting (XSS), and data breaches? Consider input validation, output encoding, and data encryption.
A
Implement input validation, output encoding, and data encryption at rest and in transit.
B
Use no input validation, no output encoding, and no data encryption.
C
Implement weak input validation, partial output encoding, and basic data encryption.
D
Use token-based input validation, full output encoding, but no data encryption.