Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 444 discussion

Actual exam question from ISC's CISSP
Question #: 444
Topic #: 1
[All CISSP Questions]

The defense strategy “never trust any input” is MOST effective against which of the following web-based system vulnerabilities?

  • A. Injection vulnerabilities
  • B. Sensitive data exposure
  • C. Man-in-the-browser attack
  • D. Broken authentication
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
yottabyte
Highly Voted 1 year, 9 months ago
Selected Answer: A
Input validation = Injection attack
upvoted 5 times
jackdryan
1 year, 6 months ago
A is correct
upvoted 1 times
...
...
Soleandheel
Most Recent 11 months, 2 weeks ago
A. Injection vulnerabilities. Injection Vulnerabilities: Injection vulnerabilities, such as SQL injection and Cross-Site Scripting (XSS), occur when an attacker is able to manipulate input fields or parameters in a way that allows them to inject malicious code or commands into an application. By adopting a mindset of "never trust any input," developers can implement strict input validation and sanitization practices to prevent malicious input from being executed as code or commands.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...