Darrel believes that a database server in his environment was compromised using a SQL injection attack. Which one of the following actions would Darrel most likely take during the remediation phase of the attack?
A. Rebuilding the database from backups
B. Adding input validation to a web application
C. Reviewing firewall logs
D. Reviewing database logs