Skip to Content

ECCouncil 212-82: Secure Application Design to Protect Weakest Link

Learn how securing the weakest link in your application’s design can prevent data breaches and protect sensitive information from hackers.

Table of Contents

Question

Miguel, a professional hacker, targeted an organization to gain illegitimate access to its critical information. He identified a flaw in the end-point communication that can disclose the target application’s data.

Which of the following secure application design principles was not met by the application in the above scenario?

A. Secure the weakest link
B. Do not trust user input
C. Exception handling
D. Fault tolerance

Answer

A. Secure the weakest link

Explanation

The scenario describes a vulnerability in end-point communication, which suggests a failure to secure the weakest link in the application’s security chain. Options B, C, and D are also crucial secure application design principles, but they don’t directly relate to the described vulnerability.

ECCouncil Certified Cybersecurity Technician 212-82 certification exam practice question and answer (Q&A) dump with detail explanation and reference available free, helpful to pass the ECCouncil Certified Cybersecurity Technician 212-82 exam and earn ECCouncil Certified Cybersecurity Technician 212-82 certification.