Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GISF Topic 3 Question 67 Discussion

Actual exam question for GIAC's GISF exam
Question #: 67
Topic #: 3
[All GISF Questions]

Web applications play a vital role in deploying different databases with user accessibility on theInternet. Which of the following allows an attacker to get unauthorized access to the database of aWeb application by sending (attacking) user-supplied data to an interpreter as part of a commandor query

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Whitney
3 hours ago
Cross Site Scripting? That's about injecting malicious scripts into web pages, not directly attacking the database. Injection flaw is the clear winner here.
upvoted 0 times
...
Eladia
7 days ago
Malicious File Execution? That's when an attacker tries to run their own program on the server. Not what this question is asking about. Injection flaw is the way to go!
upvoted 0 times
...
Ollie
8 days ago
Cross Site Request Forgery? Nah, that's more about tricking users into performing unwanted actions on the website. This question is about getting unauthorized access to the database, so it's gotta be injection flaw.
upvoted 0 times
...
Marnie
10 days ago
Injection flaw? That's the one! I remember learning about how attackers can sneak malicious code into user inputs and trick the application into executing it. Gotta watch out for those sneaky SQL injection attacks!
upvoted 0 times
...
Lynsey
14 days ago
I'm not sure, but Injection flaw does sound like the most likely answer.
upvoted 0 times
...
Dewitt
15 days ago
I agree with Roselle, Injection flaw allows attackers to access the database.
upvoted 0 times
...
Roselle
16 days ago
I think the answer is A) Injection flaw.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77