Certification Practice Exams with Real Test Questions & Answers

During a security audit of a cloud-based iscc video

 ·  PT1H46M27S  ·  EN

ccsp video for during a security audit of a cloud-based application, you identify a flaw where authorization is only enforced during the initial login process

Full Certification Question

During a security audit of a cloud-based application, you identify a flaw where authorization is only enforced during the initial login process and not on subsequent internal operations. Which security threat does this flaw most accurately align with?