Question 321
An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. The vulnerability identified is:
Question 322
A review of a number of recent XT system rollouts identified a failure to incorporate security within planning, development and implementation. Which of the following is the MOST effective way to prevent a recurrence for future systems?
Question 323
Which of the following events generally has the highest information security impact?
Question 324
Relationships between critical systems are BEST understood by:
Question 325
The MOST effective way to continuously monitor an organization's cybersecurity posture is to evaluate its