Posted by: Pdfprep
Post Date: November 6, 2020
A company identified critical vulnerability in its hyperconverged infrastructure that provides services such as computing, networking, and storage resources in a single system. Also, the company identified that this vulnerability may lead to various injection attacks that allow the attackers to execute malicious commands as the root users. The company decided to immediately implement appropriate countermeasure to defend against such attacks.
Which of the following defensive mechanisms should the company employ?
A . Data correlation
B . Patch management
C . Input validation
D . Session management
Answer: C
Leave a Reply