Match the insecure code practice to the description.

IT Questions BankCategory: Ethical HackerMatch the insecure code practice to the description.

Match the insecure code practice to the description.

Place the options in the following order:

Hard-coded credentials a catastrophic flaw that an attacker can leverage to completely compromise an application or the underlying system.
Comments in source code developers include information in source code that could provide too much information and might be leveraged by an attacker.
Lack of error handling and overly verbose error handling a type of weakness and security malpractice that can provide information to help an attacker perform additional attacks on the targeted system.
Unprotected APIs many APIs lack adequate controls and are difficult to monitor. The breadth and complexity of APIs also make it difficult to automate effective security testing.

Exam with this question: Ethical Hacker: Course Final Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments