Discover a world of knowledge at Westonci.ca, where experts and enthusiasts come together to answer your questions. Join our Q&A platform to get precise answers from experts in diverse fields and enhance your understanding. Discover in-depth answers to your questions from a wide network of professionals on our user-friendly Q&A platform.

Confidential corporate data was recently stolen by an attacker who exploited data transport protections.Which of the following vulnerabilities is the MOST likely cause of this data breach?

a. resource exhaustion on the vpn concentrators
b. weak ssl cipher strength
c. improper input handling on the ftp site
d. race condition on the packet inspection firewall


Sagot :

Baraq

Answer:

c. improper input handling on the FTP site

Explanation:

Improper input handling on the FTP site is associated with encrypting and/or decrypting of input data. It has been observed that input handling on the FTP site is one of the leading causes of vulnerabilities found in contemporary's systems and applications, this is a result of application trusting which helps to establish restrictions and prevent Improper Input Handling attacks accurately.

Hence, in this case, the correct answer is "improper input handling on the FTP site"