• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

Because of an insecure code practice, an attacker can leverage and completely compromise an application or the underlying system. What insecure code practice enabled this catastrophic threat?

  • lack of error handling 
  • use of hard-coded credentials 
  • overly verbose error handling 
  • comments that contain too much information 

Explanation & Hint:

Hard-coded credentials are catastrophic flaws that attackers can leverage to completely compromise an application or the underlying system.

For more Questions and Answers:

6.13.3 Quiz – Performing Post-Exploitation Techniques Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments