1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lyudmila [28]
3 years ago
14

You are the IT security manager for a retail merchant organization that is just going online with an e-commerce website. You are

hired several programmers to craft the code that is the backbone of your new web sales system. However, you are concerned that while the new code functions well, it might not be secure. You begin to review the code, systems design, and services architecture to track down issues and concerns. Which of the following do you hope to find in order to prevent to protect against XSS?
A. Input Validation
B. Defensive coding
C. Allowing script input
D. Escaping metacharacters
Computers and Technology
1 answer:
lions [1.4K]3 years ago
4 0

Answer:

Input validation, Allowing script input, and Escaping metacharacters

Explanation:

A programmer can implement the most effective way to prevent XSS by validating input, coding defensively, escaping metacharacters, and rejecting all script-like input.

You might be interested in
A user from the accounting department has contacted you regarding problems with a dot matrix printer. When you examine the outpu
Mama L [17]

Answer:

Replace the printhead is the correct answer.

Explanation:

Because in the following statement, that person is from the department of the accounting then, he call the technician regarding the problem occurs in the printer which is dot-matrix printer and when he examined the dot-matrix printer and replace the printhead because when he print any document then, he finds that some letters have missing from the page.

5 0
4 years ago
How can i change my age on my profile here bc i am 13 but i accidenlty put 2005 instead of 2006 no need to rush to answer just w
kykrilka [37]

Answer:

Maybe just go to personal settings and try there

Explanation:

3 0
3 years ago
Read 2 more answers
All customers are on a Customer Community License. Universal Containers needs to grant a subset of their customers, known as aff
nadya68 [22]

Answer:

Feed tracking and use customs objects record fields and post them as an update. Feed tracking detects that user follows record and update their view of What follow.

Explanation:

Feed tracking is available in Sales Group, Professional, Enterprise, and Developer.

Custom Object is a set of records that allow you to store additional data in an account record and link the data to contact.

Create a custom object in Salesforce

  • Login in sandbox
  • click the new Custom Object. select create custom Object
  • Enter Book for label
  • Enter Book for plural label
  • Click Save

// Created Custom Object and Custom Filed

  • Click new Select Number for datatype and click Next
  • Enter in the filed label
  • Enter 2 in decimal places
  • Click Next for filed-level security
  • Click Save

3 0
4 years ago
A hard drive that uses fde is often referred to as a(n) ____.
Sergio039 [100]

FDE stands for full disk encryption. FDE encrypts data as it is written to the disk and decrypt data as it is read off the disk. It is the simplest method of deploying encryption ,transparent to applications, databases, and users.

A hard drive that uses FDE is often referred to as a self-encrypting hard drive. correct answer: B

6 0
3 years ago
What happens when a computer gets a virus?
Volgvan
You will start to get ad pop-ups like crazy, and your computer will be a lot slower. I'd recommend that you be careful downloading things, make sure it's the right thing you're downloading. Some people make false websites. Also the best thing to do is get a usb drive and store everything you want to keep and reset your computer to factory in your settings.
3 0
3 years ago
Read 2 more answers
Other questions:
  • What are 3 things that can make cyberbullying especially harmful​
    12·1 answer
  • If someone receives a shock, or a piece of equipment is throwing sparks or arcing you should try to pull them away from the sour
    7·1 answer
  • Which of the following is true about images that are arranged in a collumn
    9·1 answer
  • The Sussex Educational Processor executes an instruction every 3 clock cycles. Explain why that is the case and specifically wha
    12·1 answer
  • Help me 28pts to anyone who answer this
    5·2 answers
  • How many worksheets display in the Excel window when you create a new blank workbook?
    10·2 answers
  • What data unit is addressed based on the IP address of the recipient?
    8·1 answer
  • The formula for calculting Aggregate Demand is Y=C+I+G+Nx. What does this make Aggregate Demand equal to?
    6·1 answer
  • In what ways are hardware and software different? in what ways are the the same?
    10·2 answers
  • What private service may occur on a web server?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!