ISC Certified Secure Software Lifecycle Professional CSSLP Question # 41 Topic 5 Discussion

ISC Certified Secure Software Lifecycle Professional CSSLP Question # 41 Topic 5 Discussion

CSSLP Exam Topic 5 Question 41 Discussion:
Question #: 41
Topic #: 5

Which of the following vulnerabilities occurs when an application directly uses or concatenates potentially hostile input with data file or stream functions?


A.

Insecure cryptographic storage


B.

Malicious file execution


C.

Insecure communication


D.

Injection flaw


Get Premium CSSLP Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.