1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lyudmila [28]
3 years ago
14

You are the IT security manager for a retail merchant organization that is just going online with an e-commerce website. You are

hired several programmers to craft the code that is the backbone of your new web sales system. However, you are concerned that while the new code functions well, it might not be secure. You begin to review the code, systems design, and services architecture to track down issues and concerns. Which of the following do you hope to find in order to prevent to protect against XSS?
A. Input Validation
B. Defensive coding
C. Allowing script input
D. Escaping metacharacters
Computers and Technology
1 answer:
lions [1.4K]3 years ago
4 0

Answer:

Input validation, Allowing script input, and Escaping metacharacters

Explanation:

A programmer can implement the most effective way to prevent XSS by validating input, coding defensively, escaping metacharacters, and rejecting all script-like input.

You might be interested in
How long will it take Lola to travel from Paris to nice?
Alisiya [41]

the answer is 5,000 hours.

I recommend you post these kind of questions in the mathematics section

4 0
4 years ago
Tag groups can be nested up to ____ levels deep, with up to _______ tag subgroups under a single parent.
zepelin [54]
Is it a multiple choices problem
3 0
3 years ago
Which of the following operating systems would allow a user to add functionality and sell or give away their versions?
olchik [2.2K]

Answer:open source

Explanation: what is's called

4 0
3 years ago
Use a search engine and spot the sponsored results for safer internet day.
snow_tiger [21]
What’s the question?
4 0
3 years ago
You have just taken over management of a server on which the previous server administrator has set up several server components,
Arisa [49]

Answer:

d. Ensure file caching and flushing are enabled for all disk drives.

Explanation:

When the disk reading and writing is delayed and the server performance is also slow after taking over management of a server.Previously the server has several server components.So to increase the performance we should ensure caching of the file and make sure that the flushing is enabled for all disk drives.Hence the answer to this question is option d.

8 0
3 years ago
Other questions:
  • What is a organisation in office technology
    7·1 answer
  • For Official Use Only (FOUO) and Controlled Unclassified Information (CUI) may include all of the following except: (circle one)
    10·1 answer
  • Which item is essential to know before sketching a navigation menu flowchart? template specifics, such as horizontal or vertical
    12·1 answer
  • we studied FIFO, Priority, Round Robin (RR), and Weighted Fair Queueing (WFQ) packet scheduling disciplines. Which of these queu
    12·1 answer
  • An audit trail is a record of how a transaction was handled from input through processing and output
    10·1 answer
  • You can use colors, patterns, and borders to enhance the overall appearance of a worksheet and to make it easier to read. One of
    11·1 answer
  • Dividing a hard drive into multiple sections is known as partitioning
    5·1 answer
  • REM Its an exam program
    12·1 answer
  • 56- What is the term used when you press and hold the left mouse key and more the mouse
    8·1 answer
  • How to ignore punctuation before and after a word javascript
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!