QUESTION 47 immy, an attacker, knows that he can take advantage of poorly design
ID: 3721302 • Letter: Q
Question
QUESTION 47 immy, an attacker, knows that he can take advantage of poorly designed Input valdation routines to create or alter SQL commands to gain access to private data or execute commands in the database. What technique does Jimmy use to compromise a database? O A. Jimmy can submit user input that executes an operating system command to compromise a target system O B. Jimmy can utiize this particular database threat that is an SOL Injection technique to penetrate a target system C-Jimmy can utilize an incorrect configuration that leads to access with higher-than-expected privilege of the database O o. Jimmy can gain control of system to flood the target system with requests, preventing legitimate users from gaining access chonsa ta bat ansar ?4 QUESTION 43 While testing web applications, you attempt to insert the following test script into the search area on the company's web site scripbalert('Testing Testing Testing) /script Afterwards, when you press the search button, a pop up box appears on your screen with the text Testing Testing Testing" What vulnerability is detected in the web application here? A. A hybrid attack B. A bufter overflow O c. Password attacks D. Cross Site ScriptingExplanation / Answer
47. The correct answer is Option A.
48. Option B. Buffer overflow attack.
**Comment for any further queries.
Related Questions
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.