A security team is reviewing the findings in a report that was delivered after a third party performed a penetration test. One of the findings indicated that a web application form field is vulnerable to cross-site scripting. Which of the following application security techniques should the security analyst recommend the developer implement to prevent this vulnerability?
hasquaati
Highly Voted 11 months agoPAWarriors
Highly Voted 7 months, 3 weeks agoSHADTECH123
Most Recent 6 months, 1 week agokinny4000
10 months, 1 week ago