In Ch2 of Charles' book:
Which of the following present considerable security risk?
A. Get
B. Post
C.Put
D.Trace
E.Delete
The answer is C, E
Explanation:
Both PUT and DELETE provide a way to change the file configuration on the server. Unauthorized user may lead to the uploading of malicious code or viruses.
For this question, I don't think any of the action present any security risk because we can set a security constraint, which does not allow unauthorized users.