1
answer
1
watching
176
views
aminul2005Lv1
10 Feb 2022
@ Shilpa and jeylam2666 is saying B and C
@ Course hero is saying : C and G
I am confused : Please reconfirm the correct answer pls
A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization. Which of the following actions would BEST resolve the issue? (Choose two.) :
A. Deploy a WAF.
B. Use containers.
C. Conduct input sanitization.
D. Patch the OS
E. Deploy a reverse proxy
F. Deploy a SIEM. .
G Deploy an IDS.
@ Shilpa and jeylam2666 is saying B and C
@ Course hero is saying : C and G
I am confused : Please reconfirm the correct answer pls
A company created an external application for its customers. A security researcher now reports that the application has a serious LDAP injection vulnerability that could be leveraged to bypass authentication and authorization. Which of the following actions would BEST resolve the issue? (Choose two.) :
A. Deploy a WAF.
B. Use containers.
C. Conduct input sanitization.
D. Patch the OS
E. Deploy a reverse proxy
F. Deploy a SIEM. .
G Deploy an IDS.
Read by 1 person