List of questions
Related questions
Question 175 - CIPT discussion
An organization has recently experienced a data breach where large amounts of personal data were compromised. As part of a post-incident review, the privacy technologist wants to analyze available data to understand what vulnerabilities may have contributed to the incident occurring. He learns that a key vulnerability had been flagged by the system but that detective controls were not operating effectively. Which type of web application security risk does this finding most likely point to?
A.
Insecure Design.
B.
Misconfiguration.
C.
Vulnerable and Outdated Components.
D.
Logging and Monitoring Failures.
Your answer:
0 comments
Sorted by
Leave a comment first