A new online platform allows employees to submit custom text for dynamic program output. Testers noticed that user-supplied strings can include commands that resemble code. Which solution reduces the chance of unexpected command execution in these submissions?
Configure perimeter filtering to block connections from unknown locations
Inspect user-submitted entries against a list of restricted patterns before storing or processing them
Add an intrusion detection tool that alerts on all inbound requests
Use an external key store to rotate credentials at shorter intervals
Verifying fields and filtering out harmful characters ensures the platform processes trusted input. This measure helps identify or remove suspicious patterns prior to execution. Other measures might limit system access or encrypt data but do not directly mitigate code-like inputs when they are submitted.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What does 'inspecting user-submitted entries against restricted patterns' mean?
Open an interactive chat with Bash
What are some examples of harmful characters or patterns to filter out?
Open an interactive chat with Bash
How is input sanitation different from input validation?