ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 100 - CAS-004 discussion

Report
Export

A company suspects a web server may have been infiltrated by a rival corporation. The security engineer reviews the web server logs and finds the following:

The security engineer looks at the code with a developer, and they determine the log entry is created when the following line is run:

Which of the following is an appropriate security control the company should implement?

A.
Restrict directory permission to read-only access.
Answers
A.
Restrict directory permission to read-only access.
B.
Use server-side processing to avoid XSS vulnerabilities in path input.
Answers
B.
Use server-side processing to avoid XSS vulnerabilities in path input.
C.
Separate the items in the system call to prevent command injection.
Answers
C.
Separate the items in the system call to prevent command injection.
D.
Parameterize a query in the path variable to prevent SQL injection.
Answers
D.
Parameterize a query in the path variable to prevent SQL injection.
Suggested answer: C

Explanation:

The company using the wrong port is the most likely root cause of why secure LDAP is not working. Secure LDAP is a protocol that provides secure communication between clients and servers using LDAP (Lightweight Directory Access Protocol), which is a protocol that allows querying and modifying directory services over TCP/IP. Secure LDAP uses SSL (Secure Sockets Layer) or TLS (Transport Layer Security) to encrypt LDAP traffic and prevent unauthorized disclosure or interception.

asked 02/10/2024
Slavomir Ugrevic
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first