>_COMMAND ZERO
CertificationsPricing
LearnCISSPSoftware Development Security
medium
Single Answer
0

What part of the security review process are the input parameters shown in the diagram used for?

Answer Options

A

SQL injection review

B

Sprint review

C

Fagan inspection

D

Attack surface identification

Correct Answer: D

Explanation

Each of these input parameters makes up part of the attack surface of the application. Attackers may opt to target any of them to attack the code or its supporting infrastructure.

View Reference Material

Related Questions

  • Mikaela is investigating a security incident and discovers that an attacker bega...

    medium
    Security and Risk Management
  • Alekos is working with a system that processes data. What data role does this sy...

    easy
    Asset Security
  • An accounting employee at Doolittle Industries was recently arrested for partici...

    medium
    Security and Risk Management
  • Evaggelia wants to conduct a standards-based audit of her organization. Which of...

    medium
    Security Assessment and Testing
  • Myrsini was recently hired as the first chief information security officer (CISO...

    medium
    Security Operations
  • Myrsini wants to deploy 4G LTE as an out-of-band management solution for devices...

    medium
    Communication and Network Security
>_COMMAND ZERO

Free cybersecurity certification training platform.

Master Security+, CISSP, and more.

Product

  • Certifications
  • Pricing
  • Dashboard

Company

  • About
  • Privacy Policy
  • Terms of Service

Resources

  • Security+
  • CISSP

© 2026 Command Zero. All rights reserved.

Built with Next.js, Supabase, and Clerk