Which of the following is a serverless security risk due to the poor design of identity and access controls, paving the way for attackers to identify missing resources, such as open APIs and public cloud storage, and leading to system business logic breakage and execution flow disruption?

A. Injection
B. Broken authentication
C. Sensitive data exposure
D. XML external entities (XXE)


Answer: B. Broken authentication

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a variable, constant or expression that is needed to produce the output for an action

Fill in the blank(s) with correct word

Computer Science & Information Technology

The formatting Word uses to show a document's revisions visually is termed ________

A) balloon B) comment C) markup D) strikeout

Computer Science & Information Technology

A ____ is a portion of a network.

A. subnet B. subunit C. slice D. subdivision

Computer Science & Information Technology

?As the author, you can edit a published Sway site by clicking the__________. 

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology