A security analyst is generating a list of recommendations for the company's insecure API. Which of the following is the BEST parameter mitigation recommendation?
A. Use TLS for all data exchanges.
B. Use effective authentication and authorization methods.
C. Implement parameterized queries.
D. Validate all incoming data.
A. Use TLS for all data exchanges.
B. Use effective authentication and authorization methods.
C. Implement parameterized queries.
D. Validate all incoming data.