Question 896

A vulnerability assessment of a vendor-supplied solution has revealed that the software is susceptible to cross-site scripting and SQL injection attacks. Which of the following will BEST mitigate this issue?
  • Question 897

    The MOST important objective of information security controls is to:
  • Question 898

    Which of the following components of risk scenarios has the potential to generate internal or external threat on an enterprise?
  • Question 899

    Which of the following is MOST important for an organization that wants to reduce IT operational risk?
  • Question 900

    A monthly payment report is generated from the enterprise resource planning (ERP) software to validate data against the old and new payroll systems. What is the BEST way to mitigate the risk associated with data integrity loss in the new payroll system after data migration?