Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CFA-001 Topic 4 Question 58 Discussion

Actual exam question for GAQM's CFA-001 exam
Question #: 58
Topic #: 4
[All CFA-001 Questions]

Attacker uses vulnerabilities in the authentication or session management functions such as exposed accounts, session IDs, logout, password management, timeouts, remember me. secret question, account update etc. to impersonate users, if a user simply closes the browser without logging out from sites accessed through a public computer, attacker can use the same browser later and exploit the user's privileges. Which of the following vulnerability/exploitation is referred above?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Suzan
1 months ago
I bet the answer is B) Timeout Exploitation. It's like leaving your car unlocked in a bad neighborhood - the attacker just strolls in and takes over your account. Classic!
upvoted 0 times
Felix
17 hours ago
C) I/O exploitation
upvoted 0 times
...
Stephane
2 days ago
B) Timeout Exploitation
upvoted 0 times
...
Galen
16 days ago
A) Session ID in URLs
upvoted 0 times
...
Nan
16 days ago
User 3: Definitely a risky move to not log out properly.
upvoted 0 times
...
Ressie
26 days ago
User 2: Yeah, it's like leaving the door wide open for attackers.
upvoted 0 times
...
Arlen
1 months ago
User 1: I think the answer is B) Timeout Exploitation.
upvoted 0 times
...
...
Starr
2 months ago
This is a tricky one. The question covers a lot of ground, but I'm going to have to go with D) Password Exploitation. Exposed accounts and weak password management can really open the door for impersonation attacks.
upvoted 0 times
Melina
7 days ago
A) Session ID in URLs
upvoted 0 times
...
Gertude
22 days ago
D) Password Exploitation
upvoted 0 times
...
Nu
1 months ago
C) I/O exploitation
upvoted 0 times
...
Veronique
1 months ago
B) Timeout Exploitation
upvoted 0 times
...
Maybelle
1 months ago
A) Session ID in URLs
upvoted 0 times
...
...
Mitsue
2 months ago
Hmm, I'm not sure. The question mentions a lot of different vulnerabilities, but I think the one being referred to is A) Session ID in URLs. That's a pretty sneaky way for an attacker to impersonate a user.
upvoted 0 times
Dusti
1 months ago
Yeah, it's important to always log out of public computers to prevent unauthorized access.
upvoted 0 times
...
Jin
1 months ago
I think you're right, Session ID in URLs can definitely be exploited by attackers.
upvoted 0 times
...
...
Mari
2 months ago
Ah, this is a classic case of session management vulnerabilities. I'd say the answer is B) Timeout Exploitation. Leaving the browser open without logging out is a common mistake that can leave users vulnerable.
upvoted 0 times
Derrick
1 months ago
Password exploitation is another common method used by attackers to impersonate users.
upvoted 0 times
...
Lamonica
1 months ago
Session ID in URLs can also be a vulnerability if not handled properly.
upvoted 0 times
...
Tamekia
2 months ago
It's important to always log out of public computers to prevent unauthorized access.
upvoted 0 times
...
Rodolfo
2 months ago
Yes, you're right. Timeout exploitation is a major risk when users don't log out.
upvoted 0 times
...
...
Evette
2 months ago
I believe Timeout Exploitation is also a potential vulnerability, as not setting proper timeouts can leave a user's session open for exploitation.
upvoted 0 times
...
Jaime
2 months ago
I agree with Kip, because if the session ID is exposed, an attacker can easily impersonate users.
upvoted 0 times
...
Kip
2 months ago
I think the vulnerability/exploitation referred above is Session ID in URLs.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77