A dynamic application vulnerability scan identified code injection could be performed using a web form. Which of the following will be BEST remediation to prevent this vulnerability?
A security analyst is reviewing the vulnerability scan report for a web server following an incident. The vulnerability that was used to exploit the server is present in historical vulnerability scan reports, and a patch is available for the vulnerability. Which of the following is the MOST likely cause?
Which of the following disaster recovery tests is the LEAST time consuming for the disaster recovery team?
Which of the following is a physical security control that ensures only the authorized user is present when gaining access to a secured area?