From the course: CCSP Cert Prep: 4 Cloud Application Security Audio Review
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Application security vulnerabilities Q&A
From the course: CCSP Cert Prep: 4 Cloud Application Security Audio Review
Application security vulnerabilities Q&A
- [Instructor] Here's a question about application security vulnerabilities similar to one that you might find on the CCSP exam. You are concerned about attackers attempting to execute commands on your system by entering input into web form fields that's longer than expected. What type of attack are you concerned about? Is it SQL injection, buffer overflow, privilege escalation, or direct retroversal. Let me repeat that question for you. You're concerned about attackers attempting to execute commands on your system by entering input into web form fields that's longer than expected. What type of attack are you concerned about? Is it SQL injection, buffer overflow, privilege escalation, or direct retroversal. (clock ticks) (alarm rings) Placing more information into a buffer than is allocated for that use describes a buffer overflow attack. You should use input validation to protect against this type of attack.…
Contents
-
-
-
(Locked)
Secure software development lifecycle2m 29s
-
(Locked)
Secure software development lifecycle Q&A1m 14s
-
(Locked)
Application security vulnerabilities2m 6s
-
(Locked)
Application security vulnerabilities Q&A1m 17s
-
(Locked)
Secure coding practices1m 49s
-
(Locked)
Secure coding practices Q&A1m 13s
-
(Locked)
Software security assessment2m 46s
-
(Locked)
Software security assessment Q&A1m 30s
-
(Locked)
Verified secure software2m 2s
-
(Locked)
Verified secure software Q&A55s
-
(Locked)
Cloud application architecture2m 28s
-
(Locked)
Cloud application architecture Q&A1m 18s
-
(Locked)
-