Wesley is an incident handler in a company named Maddison Tech. One day, he was learning techniques for eradicating the insecure deserialization attacks. What among the following should Wesley avoid from considering? A. Deserialization of trusted data must cross a trust boundary B. Understand the security permissions given to serialization and deserialization C. Allow serialization for security-sensitive classes D. Validate untrusted input, which is to be serialized to ensure that serialized data contain only trusted classes  Suggested Answer: C Community Answer: D This question is in 312-39 Certified Ethical Hacker Exam. For getting Certified Ethical Hacker (CEH). Disclaimers: The website is not related to, affiliated with, endorsed or authorized by EC-Council. Trademarks, certification & product names are used for reference only and belong to EC-Council. The website does not contain actual questions and answers from EC-Council's Certification Exams.
Please login or Register to submit your answer