Question 46

A developer implement the following code snippet.

Which of the following vulnerabilities does the code snippet resolve?
  • Question 47

    A disaster recovery team learned of several mistakes that were made during the last disaster recovery parallel test. Computational resources ran out at 70% of restoration of critical services.
    Which of the following should be modified to prevent the issue from reoccurring?
  • Question 48

    A security analyst discovered that the company's WAF was not properly configured. The main web server was breached, and the following payload was found in one of the malicious requests:

    Which of the following would BEST mitigate this vulnerability?
  • Question 49

    Which of the following is the MOST important security objective when applying cryptography to control messages that tell an ICS how much electrical power to output?
  • Question 50

    A company has hired a security architect to address several service outages on the endpoints due to new malware. The Chief Executive Officer's laptop was impacted while working from home. The goal is to prevent further endpoint disruption. The edge network is protected by a web proxy.
    Which of the following solutions should the security architect recommend?