Which of the following defensive mechanisms should the company employ?

Posted by: Pdfprep Category: ECSAv10 Tags: , ,

A company identified critical vulnerability in its hyperconverged infrastructure that provides services such as computing, networking, and storage resources in a single system. Also, the company identified that this vulnerability may lead to various injection attacks that allow the attackers to execute malicious commands as the root users. The company decided to immediately implement appropriate countermeasure to defend against such attacks.

Which of the following defensive mechanisms should the company employ?
A . Data correlation
B . Patch management
C . Input validation
D . Session management

Answer: C

Leave a Reply

Your email address will not be published.