Security configurations of the OWASP top ten

Which of these attack vector vulnerabilities would you likely check if the guidelines for security configuration cover the OWASP top ten?

Options
  1. Injection attacks
  2. Authentication and Session management
  3. Sensitive data exposure
  4. All of the given options

Related Posts