Question of the Day - Beinfosec
A cybersecurity analyst is reviewing the security posture of a company that extensively utilizes Representational State Transfer (REST) Application Programming Interfaces (API) for its web applications. As part of the assessment, the analyst is examining the vulnerabilities associated with REST APIs. Which of the following vulnerabilities is MOST LIKELY to be exploited in REST API implementations?
Lack of Input Validation.
Overuse of GET Requests.
Excessive Data Exposure.
Insufficient Logging and Monitoring.
12 votes
1
1 comment
Chelsea Mason
3
Question of the Day - Beinfosec
CISSP Study Group
skool.com/cissp
Share resources, get advice, and connect with peers studying cybersecurity. Join our CISSP study group and connect with fellow professionals today!
Leaderboard (30-day)
powered by