List of questions
Related questions
Question 54 - 212-82 discussion
Miguel, a professional hacker, targeted an organization to gain illegitimate access to its critical information. He identified a flaw in the end-point communication that can disclose the target application's data.
Which of the following secure application design principles was not met by the application in the above scenario?
A.
Secure the weakest link
B.
Do not trust user input
C.
Exception handling
D.
Fault tolerance
Your answer:
0 comments
Sorted by
Leave a comment first