4
answers
1
watching
179
views
aminul2005Lv1
10 Feb 2022
@Shilpa and jeylam2666 is saying answer B and C
Course hero is saying answer C and G
I am confused ... need the correct answer here
A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization. Which of the following actions would BEST resolve the issue? (Choose two.) :
A. Deploy a WAF.
B. Use containers.
C. Conduct input sanitization.
D. Patch the OS
E. Deploy a reverse proxy
F. Deploy a SIEM. .
@Shilpa and jeylam2666 is saying answer B and C
Course hero is saying answer C and G
I am confused ... need the correct answer here
A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization. Which of the following actions would BEST resolve the issue? (Choose two.) :
A. Deploy a WAF.
B. Use containers.
C. Conduct input sanitization.
D. Patch the OS
E. Deploy a reverse proxy
F. Deploy a SIEM. .
Read by 1 person
evangelistaLv10
14 Apr 2022
Already have an account? Log in
Read by 3 people
10 Feb 2022
Already have an account? Log in