What is the protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or distribution to provide confidentiality, integrity, and availability?
What is a countermeasure to the web application security frame (ASF) data validation/parameter validation threat category?
Recent vulnerability scans discovered that the organization's production web servers were responding to ping requests with server type, version, and operating system, which hackers could leverage to plan attacks.
How should the organization remediate this vulnerability?
To remediate the vulnerability of servers responding to ping requests with sensitive information, the organization should configure the servers to return as little information as possible to network requests. This practice is known as reducing the attack surface. By limiting the amount of information disclosed, potential attackers have less data to use when attempting to exploit vulnerabilities. Regular updates and patching (Option B) are also important, but they do not address the specific issue of information disclosure. Uninstalling or disabling unnecessary features (Option C) and restricting access to configuration files (Option D) are good security practices, but they do not directly prevent the leakage of server information through ping responses.
Which secure software design principle assumes attackers have the source code and specifications of the product?
Lakeesha
6 days agoLettie
13 days agoOretha
20 days agoLettie
28 days agoDenna
1 month agoGerman
1 month agoKris
2 months agoTegan
2 months agoDelbert
2 months agoDorthy
2 months agoTheola
3 months agoWillie
3 months agoCherelle
3 months agoJenelle
3 months agoCecilia
4 months ago