>_COMMAND ZERO
CertificationsPricing
LearnCISSPSoftware Development Security
medium
Single Answer
0

What part of the security review process are the input parameters shown in the diagram used for?

Answer Options

A

SQL injection review

B

Sprint review

C

Fagan inspection

D

Attack surface identification

Correct Answer: D

Explanation

Each of these input parameters makes up part of the attack surface of the application. Attackers may opt to target any of them to attack the code or its supporting infrastructure.

View Reference Material

Related Questions

  • Denis is an information security professional at an organization that is replaci...

    medium
    Communication and Network Security
  • Alekos is working with a system that processes data. What data role does this sy...

    easy
    Asset Security
  • Myrsini wants to deploy 4G LTE as an out-of-band management solution for devices...

    medium
    Communication and Network Security
  • Evaggelia wants to conduct a standards-based audit of her organization. Which of...

    medium
    Security Assessment and Testing
  • Denis is reviewing the approval process for a penetration test and wants to ensu...

    medium
    Security Assessment and Testing
  • Fotis is worried that the laptops that his organization has recently acquired we...

    easy
    Security and Risk Management
>_COMMAND ZERO

Free cybersecurity certification training platform.

Master Security+, CISSP, and more.

Product

  • Certifications
  • Pricing
  • Dashboard

Company

  • About
  • Privacy Policy
  • Terms of Service

Resources

  • Security+
  • CISSP

© 2026 Command Zero. All rights reserved.

Built with Next.js, Supabase, and Clerk