Question 321

An internal review of a web-based application system finds the ability to gain access to all employees' accounts by changing the employee's ID on the URL used for accessing the account. The vulnerability identified is:
  • Question 322

    A review of a number of recent XT system rollouts identified a failure to incorporate security within planning, development and implementation. Which of the following is the MOST effective way to prevent a recurrence for future systems?
  • Question 323

    Which of the following events generally has the highest information security impact?
  • Question 324

    Relationships between critical systems are BEST understood by:
  • Question 325

    The MOST effective way to continuously monitor an organization's cybersecurity posture is to evaluate its