1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Blizzard [7]
3 years ago
12

Sharon is responsible for the security on web applications. She’s looking to see if all applications have input validation. What

is the best way to implement validation?
Computers and Technology
1 answer:
LiRa [457]3 years ago
4 0

Answer:

Options Include:

<em>A) Server-side validation </em>

<em>B) Client-side validation </em>

<em>C) Validate in trust </em>

D) Client-side and server-side validation

<em>Client-side and server-side validation is Correct</em>

Explanation:

The best option is to validate the client side with the server side. Using these together would provide the best testing option for Sharon.

<em>This keeps user feedback instantly without wasting postbacks while also protecting against JavaScript disabled users. That's how the validation controls for ASP.NET operate. </em>

This is definitely not over-engineering as there are risks of using one without the other.

Individual validation on the server side and individual validation on the client side are both incorrect. Trust validation is not a form of validation.

You might be interested in
2. Imagine you play a game of fetch with the dog. It takes the dog 60 seconds to run a total of 180 meters. What was the dog's a
vodka [1.7K]

180 meters in 60 seconds is an average speed of 180m/60s = 3 m/s.

3 0
3 years ago
Which type of protocol allows for a secure data transmission using encryption methods?
oksano4ka [1.4K]

Answer:

The Transport Layer Security (TLS) protocol adds a layer of security on top of the TCP/IP transport protocols. TLS uses both symmetric encryption and public key encryption for securely sending private data, and adds additional security features, such as authentication and message tampering detection

5 0
2 years ago
Physical education is the body's ability to function effectively and efficiently without excessive farigue. TRUE/FALSE
Salsk061 [2.6K]

Answer: True

Explanation:

6 0
2 years ago
Electricity is moved from place to place a long __________​
nexus9112 [7]

Answer:

current of electricity

Explanation:

hope it will help full to you

6 0
3 years ago
Read 2 more answers
Choose the answer. Janice's IT department found that her computer had a program on it that was collecting her personal informati
harkovskaia [24]

Answer:

Spyware

Spam is just unwanted soliciation, spoofing is making links appear as something else, pharming is creating a fake website for victims to use.

7 0
2 years ago
Other questions:
  • ‘The increased availability of mobile digital devices has had a positive impact on how young people use their free time’. Make a
    14·2 answers
  • Create a simple main() that solves the subset sum problem for any vector of ints. Here is an example of the set-up and output. Y
    12·1 answer
  • How many computers/laptop's suported windows 10 pro with a game in vr?
    9·2 answers
  • Jeremy wishes to create a site map for his website. What tag will surround the URL of his home page? A. B. C. D.
    8·1 answer
  • A star appears under the <br> menu of the word processing program.
    5·1 answer
  • "What is the difference between dialogue and debate?
    7·1 answer
  • Apex
    5·2 answers
  • Please answer me <br> in Assignment - Algorithms
    10·1 answer
  • Discuss the term internal control​
    12·1 answer
  • How many different four-letter combinations for a locker password can you make with the lowercase and uppercase forms of the fir
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!