which of the following correctly orders various vulnerabilities in the order of MOST important to LEAST important?

A government agency considers confidentiality to be of utmost importance and availability issues
to be of least importance. Knowing this, which of the following correctly orders various

vulnerabilities in the order of MOST important to LEAST important?

A government agency considers confidentiality to be of utmost importance and availability issues
to be of least importance. Knowing this, which of the following correctly orders various

vulnerabilities in the order of MOST important to LEAST important?

A.
Insecure direct object references, CSRF, Smurf

B.
Privilege escalation, Application DoS, Buffer overflow

C.
SQL injection, Resource exhaustion, Privilege escalation

D.
CSRF, Fault injection, Memory leaks



Leave a Reply 0

Your email address will not be published. Required fields are marked *