AWS Exams GCP Exams Azure Exams GitHub Exams Jira Exams ISC2 Exams

Video: During a security audit of a cloud-based iscc video

Question 1
« Back   Next ccsp Certification Question »

Full Certification Question

During a security audit of a cloud-based application, you identify a flaw where authorization is only enforced during the initial login process and not on subsequent internal operations. Which security threat does this flaw most accurately align with?