A security engineer performed an assessment on a recently deployed web application. The engineer was able to exfiltrate a company report by visiting the following URL:
www.intranet.abc.com/get-files.jsp?file=report.pdf
Which of the following mitigation techniques would be BEST for the security engineer to recommend?
e4af987
7 months, 1 week agoYUYUY
9 months, 2 weeks agoAnarckii
10 months, 1 week agoweaponxcel
1 year ago32d799a
1 year agoCXSSP
1 year, 1 month ago