Which of the following is a serverless security risk due to the poor design of identity and access controls, paving the way for attackers to identify missing resources, such as open APIs and public cloud storage, and leading to system business logic breakage and execution flow disruption?

A. Injection
B. Broken authentication
C. Sensitive data exposure
D. XML external entities (XXE)

Answer: B. Broken authentication

Computer Science & Information Technology

You might also like to view...

What is the output of Integer.parseInt("10", 2)?

a. 1; b. 2; c. 10; d. Invalid statement;

Computer Science & Information Technology

Case 18-3 Anna, the manager of a general store, uses Microsoft Access 2016 to maintain product information. She uses multiple criteria to retrieve specific details about products. She combines two or more conditions to filter the records based on her requirement. To retrieve details of all the products with a ProductName field value of "Briston" or a RetailPrice value not equal to $10, Anna should enter:

A. ?"Briston" in the Criteria row in the ProductName column and <>10 in a different Criteria row in the RetailPrice column. B. ? in the Criteria row in the ProductName column and !={10} in the same Criteria row in the RetailPrice column. C. ?"Briston" in the Criteria row in the ProductName column and <>{10} in the same Criteria row in the RetailPrice column. D. ? in the Criteria row in the ProductName column and !=10 in a different Criteria row in the RetailPrice column.

Computer Science & Information Technology