Which of the following techniques is used to prevent input validation attacks?
Input sanitization
Cross-site scripting prevention
Intrusion detection
Buffer overflow protection

Cybersecurity Fundamentals Exercises are loading ...