A programmer is reviewing the following proprietary piece of code that was identified as a vulnerability due to users being authenticated when they provide incorrect credentials:
Which of the following should the programmer implement to remediate the code vulnerability?
vicbersong
2 weeks, 1 day ago