A dynamic application vulnerability scan identified code injection could be performed using
a web form. Which of the following will be BEST remediation to prevent this vulnerability?
(A). Implement input validations
(B). Deploy MFA
(C). Utilize a WAF
(D). Configure HIPS