Which of the following can BEST help prevent cross-site scripting attacks and buffer overflows on a production
system?

A.
Input validation
B.
Network intrusion detection system
C.
Anomaly-based HIDS
D.
Peer review
Explanation:
Input validation is a defensive technique intended to mitigate against possible user input attacks, such as buffer
overflows and fuzzing. Input validation checks every user input submitted to the application before processing
that input. The check could be a length, a character type, a language type, or a domain.