During a security audit, it is noted that your application is vulnerable to SQL Injection attacks.
Which two action would you perform to address this vulnerability?
A. Use parameterized stored procedures with the embedded parameters.
B. Add a text input validation filter to check user-supplied data.
C. Configure user permissions in the deployment descriptor.
D. Configure security roles in the deployment descriptor.
E. Deploy the Internet facing nodes in a well defined demilitarized zone (DMZ) layer.
F. Use parameterized stored procedures with the principle of least privilege.