Which of the following is a type of vulnerability where an attacker can use or cause malformed data or unexpected data to abuse an application’s logic, cause a DoS attack, or execute arbitrary code?

Posted by: Pdfprep Category: 210-250 Tags: , ,

Which of the following is a type of vulnerability where an attacker can use or cause malformed data or unexpected data to abuse an application’s logic, cause a DoS attack, or execute arbitrary code?
A . Deserialization of untrusted data
B . Serialization of untrusted data
C . Deserialization of encrypted data
D . Serialization of encrypted data

Answer: A

Leave a Reply

Your email address will not be published.