Which two techniques protect against injection attacks? (Choose two.)