Which of the following methods of protection are used by the BIG-IP ASM System to mitigate buffer overflow attacks?
A. HTTP RFC compliancy checks
B. Length restrictions and attack signatures
C. Length restrictions and site cookie compliancy checks
D. Meta-character enforcement and HTTP RFC compliancy check