62. The injection attack is a common method to break systems. For example, an attacker can
provide malicious input to a web application (inject it) and change the operation of the
service. Which one of the following is NOT a solution to the injection attack?
(A) Use a proper filter to check the user’s input
(B) Migrate the SQL service to the NoSQL service
(C) Use the prepared statement to avoid injection
(D) Use stored procedures in the database