Which of the following is the most effective way to respond to this attack?
You have determined that the company Web server has several vulnerabilities, including a buffer overflow that has resulted in an attack. The Web server uses PHP and has direct connections to an Oracle database server. It also uses many CGI scripts.
Which of the following is the most effective way to respond to this attack?
A . Installing software updates for the Web server daemon
B . Using the POST method instead of the GET method for a Web form
C . Installing an intrusion detection service to monitor logins
D . Using the GET method instead of the POST method for a Web form
Answer: A
Latest 1D0-671 Dumps Valid Version with 125 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments