A security analyst sees the following log output while reviewing web logs:
Which of the following mitigation strategies would be BEST to prevent this attack from being successful?
A . Secure cookies
B . Input validation
C . Code signing
D . Stored procedures
Answer: B