Which mitigation method is effective against cross-site scripting?
- requiring multifactor authentication
- using only necessary features and secure packages downloaded from official sources and verified with a signature
- sanitizing untrusted content
- consistent hardening of systems and applications