0 votes
in OWASP Top 10 Vulnerabilities by

Which of the following actions should you take to verify the implementation of a web application?

       A. Use policy mechanisms

       B. Verify that each URL in your application is appropriately protected

       C. Use a simple and positive model at every layer

1 Answer

0 votes
by

Correct answer is :- Verify that each URL in your application is appropriately protected

Related questions

0 votes
asked Feb 12, 2022 in OWASP Top 10 Vulnerabilities by DavidAnderson
0 votes
asked Feb 12, 2022 in OWASP Top 10 Vulnerabilities by DavidAnderson
...