1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lyudmila [28]
2 years ago
14

You are the IT security manager for a retail merchant organization that is just going online with an e-commerce website. You are

hired several programmers to craft the code that is the backbone of your new web sales system. However, you are concerned that while the new code functions well, it might not be secure. You begin to review the code, systems design, and services architecture to track down issues and concerns. Which of the following do you hope to find in order to prevent to protect against XSS?
A. Input Validation
B. Defensive coding
C. Allowing script input
D. Escaping metacharacters
Computers and Technology
1 answer:
lions [1.4K]2 years ago
4 0

Answer:

Input validation, Allowing script input, and Escaping metacharacters

Explanation:

A programmer can implement the most effective way to prevent XSS by validating input, coding defensively, escaping metacharacters, and rejecting all script-like input.

You might be interested in
patty works at Mcdonald's as a chef. it is her job to make hamburgers as each order arrives on her computer screen. one day patt
il63 [147K]
Angela should make sure the hamburger patty is disposed of and a new one prepared for the hamburger. She should reprimand Patty as what she did is wrong. Patty could well be fired for what she did. It is unsafe and unsanitary to give a customer food that has fallen on the floor. Angela should make sure this never happens again.

4 0
2 years ago
Read 2 more answers
Phil wants to add a new video card, and he is sure the power supply is sufficient to run the new video card. But when he tries t
pshichka [43]

Answer:

Using a SATA to a 6 pin PCI-E adapter.

Explanation:

sometimes you may feel the need to make some upgrades to your computer, video cards are options where an upgrade is made, a 6 Pin PCI-E adapter is 6 pins 12V power adapter used to power a video card where their slots cannot provide them with enough power they require. in a situation where the card requires a lot of power than the slot can provide, 6 pins PCI-E adapter is a very good option.

4 0
3 years ago
Is “Annabelle” a true story? I mean it is fiction right?
Julli [10]
Annabelle is indeed a true story making it fiction
5 0
3 years ago
Read 2 more answers
Practice using word processing software, including creating, formatting, and saving a document.
irakobra [83]

When writing the cover letter, the following points are important:

  • Keep it short.
  • Proofread.
  • Avoid cliches.
  • Be creative.

<h3>What is a cover letter?</h3>

A cover letter simply means a document that's written alongside a CV when an individual applies for jobs.

The cover letter should be addressed to a specific person and should describe one's accomplishments and achievements.

Learn more about cover letters on:

brainly.com/question/3602860

6 0
2 years ago
Which of the following terms means to take notes from a resource in your own words
Elan Coil [88]
Paraphrase is the correct answer
8 0
3 years ago
Read 2 more answers
Other questions:
  • Given an array a, declared to contain 34 elements, write an expression that refers to the last element of the array.
    12·1 answer
  • What error, if any, is in the following code?
    11·1 answer
  • i have a bag of trail mix . one half of the bag is peanuts. 1/4 of the bag is chocolate candies , and 1/4 of the bag is died fru
    15·1 answer
  • 1. Actuators apply mechanical force in the form of pressure to overcome
    10·1 answer
  • What is the meaning of web browser
    11·1 answer
  • Define a new class Fighter that inherits from Spaceship. Add a variable property weapon that defaults to an empty string and a v
    14·1 answer
  • The number of __________ to your website that had not visited prior to the time frame being analyzed.
    9·1 answer
  • Lesson 3 - Calling All Operators
    6·1 answer
  • Positive use of the technology before the pandemic.
    8·1 answer
  • What is a file and where can we make use of a file?​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!