CCT - Certified Cybersecurity Technician Practice Test
CCT - Certified Cybersecurity Technician CCT CCT Application Security & Secure Coding
Which OWASP Top 10 vulnerability occurs when untrusted data is sent to an interpreter as part of a command or query?
Select your answer
A
Injection
B
Broken Authentication
C
Security Misconfiguration
D
Insecure Deserialization
Hint