A new online platform allows employees to submit custom text for dynamic program output. Testers noticed that user-supplied strings can include commands that resemble code. Which solution reduces the chance of unexpected command execution in these submissions?
Add an intrusion detection tool that alerts on all inbound requests
Use an external key store to rotate credentials at shorter intervals
Configure perimeter filtering to block connections from unknown locations
Inspect user-submitted entries against a list of restricted patterns before storing or processing them
Verifying fields and filtering out harmful characters ensures the platform processes trusted input. This measure helps identify or remove suspicious patterns prior to execution. Other measures might limit system access or encrypt data but do not directly mitigate code-like inputs when they are submitted.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are restricted patterns, and how are they used to secure applications?
Open an interactive chat with Bash
What types of harmful characters or inputs should developers look for in submissions?
Open an interactive chat with Bash
How does input validation differ from other security measures like intrusion detection?