Which production can the engineer implement to protect against this vulnerability?


A Citrix Engineer is reviewing the log files for a sensitive web application and notices that someone accessed the application using the engineer’s credentials while the engineer was out of the office for an extended period of time.

Which production can the engineer implement to protect against this vulnerability?
A . Deny URL
B . Buffer Overflow
C . Form Field Consistency
D . Cookie Consistency

Answer: C

Leave a Reply

Your email address will not be published.