Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Salesforce Exam Platform Developer I Topic 3 Question 91 Discussion

Actual exam question for Salesforce's Platform Developer I exam
Question #: 91
Topic #: 3
[All Platform Developer I Questions]

Which code in a Visualforce page and/or controller might present a security vulnerability?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Georgiana
5 months ago
As a Salesforce security expert, I can confirm that B is the answer you're looking for. Gotta keep those bad guys out!
upvoted 0 times
Evangelina
3 months ago
Thanks for the info, I'll go with B then.
upvoted 0 times
...
Crista
3 months ago
No, it's actually B.
upvoted 0 times
...
Omega
4 months ago
I think the answer is A.
upvoted 0 times
...
Hester
4 months ago
C) Good to know, I'll be more cautious with my Visualforce pages now.
upvoted 0 times
...
Lorean
4 months ago
B) Thanks for the tip, I'll make sure to watch out for that in my code.
upvoted 0 times
...
Cyndy
4 months ago
A) Incorrect, the correct answer is B.
upvoted 0 times
...
...
Doyle
5 months ago
Hmm, D doesn't seem quite right. Didn't they teach us about the importance of escaping user input in Salesforce dev school?
upvoted 0 times
Whitley
4 months ago
B) Yeah, B is also a potential vulnerability because it's not escaping user input either.
upvoted 0 times
...
Matt
4 months ago
A) That's right, A is the vulnerable code because it's not properly escaping user input.
upvoted 0 times
...
...
Dorthy
5 months ago
Haha, who needs security when you've got magic? Option A all the way!
upvoted 0 times
Lynelle
4 months ago
Definitely, better safe than sorry when it comes to security.
upvoted 0 times
...
Blondell
5 months ago
I agree, option A seems like it could cause a vulnerability.
upvoted 0 times
...
Rossana
5 months ago
Yeah, security is important, I would go with option B.
upvoted 0 times
...
Karl
5 months ago
Option A looks risky, better be careful.
upvoted 0 times
...
...
Michel
5 months ago
I think Option C is the correct answer. Outputting user input without proper sanitization can open up the page to injection attacks.
upvoted 0 times
Bulah
5 months ago
Yes, outputting user input without proper sanitization can lead to injection attacks.
upvoted 0 times
...
Bulah
5 months ago
I agree, option C is definitely a security vulnerability.
upvoted 0 times
...
...
Lenna
5 months ago
I believe option B is also risky, as it allows for unescaped user input to be displayed on the page.
upvoted 0 times
...
Bettina
6 months ago
Option B looks like a security risk. It doesn't escape the user input, which could lead to XSS vulnerabilities.
upvoted 0 times
Nu
5 months ago
Always important to sanitize user input to protect against attacks.
upvoted 0 times
...
Tamar
5 months ago
I agree, not escaping user input can open up security vulnerabilities.
upvoted 0 times
...
Gail
5 months ago
Yeah, not escaping user input can lead to XSS vulnerabilities.
upvoted 0 times
...
Rosalyn
5 months ago
Option B does look risky. It should escape user input to prevent XSS.
upvoted 0 times
...
Lashawnda
5 months ago
I think option B is risky.
upvoted 0 times
...
...
Ozell
6 months ago
I agree with Brittni, because using user input directly in the code can lead to injection attacks.
upvoted 0 times
...
Brittni
6 months ago
I think option A might present a security vulnerability.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77