Question 235:
Attackers who exploit cross-site scripting vulnerabilities take advantage of:
Answer options:
A. a lack of proper input validation controls. B. weak authentication controls in the web application layer. C. flawed cryptographic secure sockets layer (SSL) implementations and short key lengths. D. implicit web application trust relationships.