Learn how securing the weakest link in your application’s design can prevent data breaches and protect sensitive information from hackers.
Table of Contents
Question
Miguel, a professional hacker, targeted an organization to gain illegitimate access to its critical information. He identified a flaw in the end-point communication that can disclose the target application’s data.
Which of the following secure application design principles was not met by the application in the above scenario?
A. Secure the weakest link
B. Do not trust user input
C. Exception handling
D. Fault tolerance
Answer
A. Secure the weakest link
Explanation
The scenario describes a vulnerability in end-point communication, which suggests a failure to secure the weakest link in the application’s security chain. Options B, C, and D are also crucial secure application design principles, but they don’t directly relate to the described vulnerability.
ECCouncil Certified Cybersecurity Technician 212-82 certification exam practice question and answer (Q&A) dump with detail explanation and reference available free, helpful to pass the ECCouncil Certified Cybersecurity Technician 212-82 exam and earn ECCouncil Certified Cybersecurity Technician 212-82 certification.