dsBest defense against injection attacks A. Regularly updated signature files B. A properly configured firewall C. An intrusion detection system D. Strict controls…byJohn