An organization's web servers host an online ordering system. The organization discovers that the servers are vulnerable to a malicious JavaScript injection, which could allow attackers to access customer payment information. Which of the following mitigation strategies would be most effective for preventing an attack on the organization's web servers? (Choose two.)
ProudFather
3 weeks, 3 days agoFourgehan
1 month, 2 weeks agoAriGarcia
1 month, 2 weeks ago