• Post author:
  • Post category:Blog
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

Match the insecure code practice to the description.

Match the insecure code practice to the description
Match the insecure code practice to the description
  • Lack of error handling and overly verbose error handling ==> A type of weakness and security malpractice that can provide information to help an attacker perform additional attacks on the targeted system.
  • Comments in source code ==> Developers include information in source code that could provide too much information and might be leveraged by an attacker.
  • Unprotected APIs ==> Many APIs lack adequate controls and are difficult to monitor. The breadth and complexity of APIs also make it difficult to automate effective security testing.
  • Hard-coded credentials ==> A catastrophic flaw that an attacker can leverage to completely compromise an application or the underlying system.
Explanation & Hints:

Place the options in the following order:

Hard-coded credentials A catastrophic flaw that an attacker can leverage to completely compromise an application or the underlying system.
Comments in source code Developers include information in source code that could provide too much information and might be leveraged by an attacker.
Lack of error handling and overly verbose error handling A type of weakness and security malpractice that can provide information to help an attacker perform additional attacks on the targeted system.
Unprotected APIs Many APIs lack adequate controls and are difficult to monitor. The breadth and complexity of APIs also make it difficult to automate effective security testing.

For more Questions and Answers:

Ethical Hacker Course Final Exam Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments