Secure Software Lifecycle Professional – CSSLP – Question159
Which of the following vulnerabilities occurs when an application directly uses or concatenates potentially hostile input with data file or stream functions? A. Insecure cryptographic storage B. Malicious file execution C. Insecure communication D. Injection flaw
Correct Answer: B
Explanation:
Explanation: Malicious file execution is a vulnerability that occurs when an application directly uses or concatenates potentially hostile input with data file or stream functions. This leads to arbitrary remote and hostile data being included, processed, and invoked by the Web server. Malicious file execution can be prevented by using an indirect object reference map, input validation, or explicit taint checking mechanism. Answer: D is incorrect. Injection flaw occurs when data is sent to an interpreter as a part of command or query. Answer: A is incorrect. Insecure cryptographic storage occurs when applications have failed to encrypt data. Answer: C is incorrect. Insecure communication occurs when applications have failed to encrypt network traffic.
Please disable your adblocker or whitelist this site!