exam questions

Exam 212-82 All Questions

View all questions & answers for the 212-82 exam

Exam 212-82 topic 1 question 17 discussion

Actual exam question from ECCouncil's 212-82
Question #: 17
Topic #: 1
[All 212-82 Questions]

Miguel, a professional hacker, targeted an organization to gain illegitimate access to its critical information. He identified a flaw in the end-point communication that can disclose the target application's data.
Which of the following secure application design principles was not met by the application in the above scenario?

  • A. Secure the weakest link
  • B. Do not trust user input
  • C. Exception handling
  • D. Fault tolerance
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
kanchantanwani
Highly Voted 1 year, 4 months ago
Selected Answer: A
The correct answer is A: Secure the weakest link Attackers target a system that is easy to penetrate. For example, to gain access to the encrypted data on the network, attackers will not intercept the data and crack encryption; instead they will go after the end points of communication to find a flaw that discloses the data. Identify and strengthen the areas at risk until levels of risk are satisfactory. Source: EC Council - C|CT: Courseware Module 9 - Understand Secure Application Design & Architecture - Define Secure Design Principles
upvoted 5 times
...
044f354
Most Recent 1 month, 3 weeks ago
Selected Answer: A
EC-Council Official Curricula Certified Cybersecurity Technician v1 https://online.vitalsource.com/reader/books/9781635679533/ Module 09 Page 1152 Secure the weakest link Attackers target a system that is easy to penetrate. For example, to gain access to the encrypted data on the network, attackers will not intercept the data and crack encryption; instead they will go after the end points of communication to find a flaw that discloses the data. Identify and strengthen the areas at risk until levels of risk are satisfactory.
upvoted 1 times
...
jamiekji
7 months ago
Selected Answer: A
Secure the weakest link
upvoted 1 times
...
aman_baik
12 months ago
Selected Answer: A
Secure the weakest link. Module 09 Page 1152.
upvoted 4 times
...
AmesCB
1 year, 1 month ago
Secure the weakest link
upvoted 2 times
...
pepcyber
1 year, 1 month ago
Secure the weakest Link A
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago