3
answers
1
watching
275
views
aminul2005Lv1
4 Feb 2022
A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization. Which of the following actions would BEST resolve the issue? (Choose two.) :
A. Deploy a WAF.
B. Use containers.
C. Conduct input sanitization.
D. Patch the OS
E. Deploy a reverse proxy
F. Deploy a SIEM. .
G Deploy an IDS.
A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization. Which of the following actions would BEST resolve the issue? (Choose two.) :
A. Deploy a WAF.
B. Use containers.
C. Conduct input sanitization.
D. Patch the OS
E. Deploy a reverse proxy
F. Deploy a SIEM. .
G Deploy an IDS.
Liked by aminul2005 and 1 others
Read by 4 people
jeylam2666Lv10
4 Feb 2022
Already have an account? Log in
Read by 4 people
msniyas123Lv1
4 Feb 2022
Already have an account? Log in