ISC2 CISSP Practice Question

A financial services company is developing a new mobile banking application that will interact with their existing backend systems through multiple APIs. During the security assessment phase, the security team needs to evaluate these APIs for potential security vulnerabilities. Which of the following testing approaches would be BEST for identifying authentication bypass vulnerabilities in the application's APIs?

  • You selected this option

    Port scanning the backend servers hosting the APIs

  • You selected this option

    Schema validation testing of API request and response formats

  • You selected this option

    Load testing the APIs to measure their performance under stress

  • You selected this option

    Fuzzing the API endpoints with unexpected input values

ISC2 CISSP
Security Assessment and Testing
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot