Which of the following is an appropriate security control the company should implement?

A company suspects a web server may have been infiltrated by a rival corporation.

The security engineer reviews the web server logs and finds the following:

The security engineer looks at the code with a developer, and they determine the log entry is created when the following line is run:

Which of the following is an appropriate security control the company should implement?
A . Restrict directory permission to read-only access.
B . Use server-side processing to avoid XSS vulnerabilities in path input.
C . Separate the items in the system call to prevent command injection.
D . Parameterize a query in the path variable to prevent SQL injection.

Answer: C

Latest CAS-004 Dumps Valid Version with 128 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments