Question.51 Which of the following threat types can occur when encryption is not properly applied or insecure transport mechanisms are used? (A) Security misconfiguration (B) Insecure direct object references (C) Sensitive data exposure (D) Unvalidated redirects and forwards |
51. Click here to View Answer
Correct Answer: C
Sensitive data exposure occurs when information is not properly secured through encryption and secure transport mechanisms; it can quickly become an easy and broad method for attackers to compromise information. Web applications must enforce strong encryption and security controls on the application side, but secure methods of communications with browsers or other clients used to access the information are also required. Security misconfiguration occurs when applications and systems are not properly configured for security, often a result of misapplied or inadequate baselines. Insecure direct object references occur when code references aspects of the infrastructure, especially internal or private systems, and an attacker can use that knowledge to glean more information about the infrastructure. Unvalidated redirects and forwards occur when an application has functions to forward users to other sites, and these functions are not properly secured to validate the data and redirect requests, thus allowing spoofing for malware or phishing attacks.
Question.52 What is the best approach for dealing with services or utilities that are installed on a system but not needed to perform their desired function? (A) Remove (B) Monitor (C) Disable (D) Stop |
52. Click here to View Answer
Correct Answer: C
Question.53 Which of the following actions will NOT make data part of the “create” phase of the cloud data lifecycle? (A) Modifying metadata (B) Importing data (C) Modifying data (D) Constructing new data |
53. Click here to View Answer
Correct Answer: A
Although the initial phase is called “create,” it can also refer to modification. In essence, any time data is considered “new,” it is in the create phase. This can come from data that is newly created, data that is imported into a system and is new to that system, or data that is already present and modified into a new form or value. Modifying the metadata does not change the actual data.