Which of the following is a serverless security risk due to the poor design of identity and access controls, paving the way for attackers to identify missing resources, such as open APIs and public cloud storage, and leading to system business logic breakage and execution flow disruption?
A. Injection
B. Broken authentication
C. Sensitive data exposure
D. XML external entities (XXE)
Answer: B. Broken authentication
You might also like to view...
What is the output of Integer.parseInt("10", 2)?
a. 1; b. 2; c. 10; d. Invalid statement;
Case 18-3 Anna, the manager of a general store, uses Microsoft Access 2016 to maintain product information. She uses multiple criteria to retrieve specific details about products. She combines two or more conditions to filter the records based on her requirement. To retrieve details of all the products with a ProductName field value of "Briston" or a RetailPrice value not equal to $10, Anna should enter:
A. ?"Briston" in the Criteria row in the ProductName column and <>10 in a different Criteria row in the RetailPrice column.
B. ?