List of questions
Related questions
Question 352 - CAS-004 discussion
A security engineer performed an assessment on a recently deployed web application. The engineer was able to exfiltration a company report by visiting the following URL:
www.intranet.abc.com/get-files.jsp?file=report.pdf
Which of the following mitigation techniques would be BEST for the security engineer to recommend?
A.
Input validation
B.
Firewall
C.
WAF
D.
DLP
Your answer:
0 comments
Sorted by
Leave a comment first