It has come to the IT administrator’s attention that the “post your comment” field on the company blog page has been exploited, resulting in cross-site scripting attacks against customers reading the blog. Which of the following would be the MOST effective at preventing the “post your comment” field from being exploited?
A . Update the blog page to HTTPS
B . Filter metacharacters
C . Install HIDS on the server
D . Patch the web application
E . Perform client side input validation
Answer: B