ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 67 - 1Y0-341 discussion

Report
Export

A Citrix Engineer is reviewing the log files for a sensitive web application and notices that someone accessed the application using the engineer’s credentials while the engineer was out of the office for an extended period of time.

Which production can the engineer implement to protect against this vulnerability?

A.
Deny URL
Answers
A.
Deny URL
B.
Buffer Overflow
Answers
B.
Buffer Overflow
C.
Form Field Consistency
Answers
C.
Form Field Consistency
D.
Cookie Consistency
Answers
D.
Cookie Consistency
Suggested answer: C
asked 16/09/2024
Han Valk
46 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first