Which of the following methods of protection are used by BIG-IP ASM to mitigate buffer overflow attacks?
A. HTTP RFC compliancy check
B. Length restrictions and attack signatures
C. Length restrictions and meta character enforcement
D. Meta character enforcement and HTTP RFC compliancy check