Google Professional Cloud Security Engineer

Google Professional Cloud Security Engineer

Get started today

Ultimate access to all questions.


Your company's development team has identified that a web application hosted in a staging GKE environment dynamically includes user data in web pages without proper input validation. This flaw could enable an attacker to execute malicious scripts and display arbitrary content in a victim's browser if deployed to production.

How should you remediate and prevent this vulnerability?