To protect against CSRF attacks, developers can implement _____ to ensure requests are only accepted from trusted sources.

  • Authentication
  • Cross-origin resource sharing (CORS)
  • Encryption
  • Rate limiting
To protect against CSRF (Cross-Site Request Forgery) attacks, developers can implement Cross-origin resource sharing (CORS) to ensure that requests are only accepted from trusted sources. CORS helps prevent unauthorized websites from making malicious requests to APIs on behalf of users.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *