Which of the following is a serverless security risk due to the poor design of identity and access controls, paving the way for attackers to identify missing resources, such as open APIs and public cloud storage, and leading to system business logic breakage and execution flow disruption?
A. Injection
B. Broken authentication
C. Sensitive data exposure
D. XML external entities (XXE)
Answer: B. Broken authentication
Computer Science & Information Technology
You might also like to view...
A(n) ________ is a variable, constant or expression that is needed to produce the output for an action
Fill in the blank(s) with correct word
Computer Science & Information Technology
The formatting Word uses to show a document's revisions visually is termed ________
A) balloon B) comment C) markup D) strikeout
Computer Science & Information Technology
A ____ is a portion of a network.
A. subnet B. subunit C. slice D. subdivision
Computer Science & Information Technology
?As the author, you can edit a published Sway site by clicking the__________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology