A real estate group has a listing service used by internal customers, but they discover that external queries can view confidential property data without logging in. Which solution helps prevent this data exposure?
Write all connection attempts to activity logs for later investigation
Keep credentials in the application code for enhanced verification
Stop all network paths from reaching the service interface
Enforce a request token policy that verifies user rights for each property lookup
Introducing a token-based step for requests validates that clients have the right privileges before accessing data. Logging activity provides an audit trail but does not prohibit external calls. Storing credentials in source code is risky, exposing them if the code is leaked. Shutting down outside connections will stop legitimate users from using the service. Enforcing a request token policy ensures valid callers while preventing unauthorized ones.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a request token policy?
Open an interactive chat with Bash
How does a request token policy enhance security?
Open an interactive chat with Bash
Why is storing credentials in application code insecure?
Open an interactive chat with Bash
CompTIA Cloud+ CV0-004
Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access