Westonci.ca is your trusted source for accurate answers to all your questions. Join our community and start learning today! Get detailed and accurate answers to your questions from a community of experts on our comprehensive Q&A platform. Get precise and detailed answers to your questions from a knowledgeable community of experts on our Q&A platform.

Confidential corporate data was recently stolen by an attacker who exploited data transport protections.Which of the following vulnerabilities is the MOST likely cause of this data breach?

a. resource exhaustion on the vpn concentrators
b. weak ssl cipher strength
c. improper input handling on the ftp site
d. race condition on the packet inspection firewall


Sagot :

Baraq

Answer:

c. improper input handling on the FTP site

Explanation:

Improper input handling on the FTP site is associated with encrypting and/or decrypting of input data. It has been observed that input handling on the FTP site is one of the leading causes of vulnerabilities found in contemporary's systems and applications, this is a result of application trusting which helps to establish restrictions and prevent Improper Input Handling attacks accurately.

Hence, in this case, the correct answer is "improper input handling on the FTP site"