A recently concluded penetration test revealed that a legacy web application is vulnerable to SQL injection. Research indicates that completely remediating the vulnerability would require an architectural change, and the stakeholders are not in a position to risk the availability on the application. Under such circumstances, which of the following controls are low-effort, short-term solutions to minimize the SQL injection risk? (Choose two.)
boblee
Highly Voted 4 years, 10 months agoMrRiver
3 years, 7 months agoAriel235788
3 years, 5 months agomiabe
Most Recent 2 years, 9 months agoCock
3 years, 2 months agomr_robot
5 years agoD1960
4 years, 11 months agoAcidscars
4 years, 4 months agomr_robot
4 years, 11 months ago