Question
a.
Intentionally disclose credentials for transparency.
b.
Use generic usernames and passwords.
c.
Remove sensitive information before publishing code.
d.
Encrypt credentials to make them inaccessible.
Posted under CompTIA PenTest+ Certification Exam PT0 002
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. What can developers do to mitigate the risk of hard-coded credentials being disclosed in public repositories?
Similar Questions
Discover Related MCQs
Q. What precaution should developers take regarding source code comments in web applications?
View solution
Q. Why might source code comments include security details that should remain secret?
View solution
Q. What is a race condition in the context of security vulnerabilities?
View solution
Q. What does TOCTTOU stand for in the context of race conditions?
View solution
Q. How can developers address TOCTTOU vulnerabilities?
View solution
Q. Why should APIs be properly secured with authentication mechanisms?
View solution
Q. What standard has largely replaced SOAP in modern APIs?
View solution
Q. What is the primary security consideration for communications between clients and servers using APIs?
View solution
Q. Why is the use of API keys important for securing non-public APIs?
View solution
Q. What risk is associated with running unsigned code?
View solution
Q. How does code signing contribute to code authenticity?
View solution
Q. What is the purpose of code signing in the context of end-user security?
View solution
Q. What is the main concern addressed by the OWASP Top Ten Web Application Security Risks?
View solution
Q. What is "injection flaws" in the context of web security?
View solution
Q. When does "broken authentication" occur?
View solution
Q. What is the consequence of "sensitive data exposure"?
View solution
Q. What is a potential outcome of "XML External Entities" vulnerabilities?
View solution
Q. When does "broken access control" occur?
View solution
Q. What is the root cause of "security misconfigurations"?
View solution
Q. What is the essence of a "cross-site scripting" attack?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond CompTIA PenTest+ Certification Exam PT0 002? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!