>_COMMAND ZERO
CertificationsPricing
LearnCISSPSoftware Development Security
medium
Single Answer
0

What part of the security review process are the input parameters shown in the diagram used for?

Answer Options

A

SQL injection review

B

Sprint review

C

Fagan inspection

D

Attack surface identification

Correct Answer: D

Explanation

Each of these input parameters makes up part of the attack surface of the application. Attackers may opt to target any of them to attack the code or its supporting infrastructure.

View Reference Material

Related Questions

  • Mikaela is investigating a security incident and discovers that an attacker bega...

    medium
    Security and Risk Management
  • Denis is an information security professional at an organization that is replaci...

    medium
    Communication and Network Security
  • Melania is reviewing posts to a user forum on her company's website, and when sh...

    medium
    Software Development Security
  • Which one of the following actions might be taken as part of a business continui...

    medium
    Security and Risk Management
  • Alekos is designing layered network security for his organization. If the VPN gr...

    easy
    Communication and Network Security
  • NIST Special Publication 800-115, the Technical Guide to Information Security Te...

    medium
    Security Assessment and Testing
>_COMMAND ZERO

Free cybersecurity certification training platform.

Master Security+, CISSP, and more.

Product

  • Certifications
  • Pricing
  • Dashboard

Company

  • About
  • Privacy Policy
  • Terms of Service

Resources

  • Security+
  • CISSP

© 2026 Command Zero. All rights reserved.

Built with Next.js, Supabase, and Clerk