A government agency considers confidentiality to be of utmost importance and availability issues
to be of least importance. Knowing this, which of the following correctly orders various
vulnerabilities in the order of MOST important to LEAST important?
A.
Insecure direct object references, CSRF, Smurf
B.
Privilege escalation, Application DoS, Buffer overflow
C.
SQL injection, Resource exhaustion, Privilege escalation
D.
CSRF, Fault injection, Memory leaks