An SQL database is no longer accessible online due to a recent security breach. An investigation reveals that unauthorized access to the database was possible due to an SQL injection vulnerability.
To prevent this type of breach in the future, which of the following security controls should be put in place before bringing the database back online? (Choose two.)
A . Secure storage policies
B . Browser security updates
C . Input validation
D . Web application firewall
E . Secure coding standards
F . Database activity monitoring
Answer: CF