ExamGecko
Home Home / ISC / CISSP
Question list
Search
Search

Question 976 - CISSP discussion

Report
Export

A web-based application known to be susceptible to attacks is now under review by a senior developer. The organization would like to ensure this application Is less susceptible to injection attacks specifically, What strategy will work BEST for the organization's situation?

A.
Do not store sensitive unencrypted data on the back end.
Answers
A.
Do not store sensitive unencrypted data on the back end.
B.
Whitelist input and encode or escape output before it is processed for rendering.
Answers
B.
Whitelist input and encode or escape output before it is processed for rendering.
C.
Limit privileged access or hard-coding logon credentials,
Answers
C.
Limit privileged access or hard-coding logon credentials,
D.
Store sensitive data in a buffer that retains data in operating system (OS) cache or memory.
Answers
D.
Store sensitive data in a buffer that retains data in operating system (OS) cache or memory.
Suggested answer: B

Explanation:

asked 18/09/2024
Sivagami Narayanan
49 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first