اختبار شهادة Certified Ethical Hacker (CEH) V13

السؤال 348 من 403

كل الأسئلة

Ron discovers that an internal API lets attackers access and perform actions on sensitive objects (view, update, delete) because the API does not properly enforce attribute-based access rules on each object. Which API vulnerability is this?

الخيارات

  • A Code injections
  • B Improper use of CORS
  • C No ABAC validation
  • D Business logic flaws

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.