From a security perspective, which of the following assumptions MUST be made about input to an application?
A. It is tested
B. It is logged
C. It is verified
D. It is untrusted
A. It is tested
B. It is logged
C. It is verified
D. It is untrusted