At Westonci.ca, we make it easy for you to get the answers you need from a community of knowledgeable individuals. Get detailed and accurate answers to your questions from a dedicated community of experts on our Q&A platform. Get detailed and accurate answers to your questions from a dedicated community of experts on our Q&A platform.

Confidential corporate data was recently stolen by an attacker who exploited data transport protections.Which of the following vulnerabilities is the MOST likely cause of this data breach?

a. resource exhaustion on the vpn concentrators
b. weak ssl cipher strength
c. improper input handling on the ftp site
d. race condition on the packet inspection firewall


Sagot :

Baraq

Answer:

c. improper input handling on the FTP site

Explanation:

Improper input handling on the FTP site is associated with encrypting and/or decrypting of input data. It has been observed that input handling on the FTP site is one of the leading causes of vulnerabilities found in contemporary's systems and applications, this is a result of application trusting which helps to establish restrictions and prevent Improper Input Handling attacks accurately.

Hence, in this case, the correct answer is "improper input handling on the FTP site"