Question 14 / 20:
You would like to raise the security level of your system by examining incoming HTTP requests. You would like to log information about each request and to filter requests with malicious scripts.
Where would you put such request processing code?