Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

XML Exam I10-003 Topic 6 Question 56 Discussion

Actual exam question for XML's I10-003 exam
Question #: 56
Topic #: 6
[All I10-003 Questions]

A certain Web application displays user information according to user input via Web browser. The XML data managing user information is as shown in [example xm I] referenced in a separate window.

At this time, the Web application completes the [XQuery] by replacing (1) and (2) with the user input character string, and executes the query.

No character escapes (e.g. convert "<" to "<") are performed for character string input by the user.

Select the query execution result when the user input character string is as follows:

(1) "]/fn:root(),()/a[a="

(2) OK

Show Suggested Answer Hide Answer
Suggested Answer: B, F

Contribute your Thoughts:

Franklyn
1 months ago
Ah, the age-old dilemma: to sanitize or not to sanitize? That is the question. And the answer is, of course, to sanitize. Unless you're a fan of XML-flavored chaos, that is.
upvoted 0 times
Vivienne
5 days ago
User2
upvoted 0 times
...
Amalia
1 months ago
User1
upvoted 0 times
...
...
Solange
2 months ago
I'm going with B. I mean, who wouldn't want to see the user information displayed, right? What could possibly go wrong?
upvoted 0 times
Julene
1 months ago
User 2
upvoted 0 times
...
Martina
1 months ago
User 1
upvoted 0 times
...
...
Kenny
2 months ago
D, definitely D. An error should occur when the user input is passed directly into the XQuery without any sanitization. That's a classic security flaw waiting to happen.
upvoted 0 times
Kate
2 days ago
C) \n\n\nid1\npass1\nname1\n
add1
\n
\n\nid2\npass2\nname2\n
add2
\n
\n
\n\n
upvoted 0 times
...
Miesha
5 days ago
B) \n\n\nid1\npass1\nname1\n
add1
\n
\n\nid2\npass2\nname2\n
add2
\n
\n
\n
upvoted 0 times
...
Francesco
13 days ago
A)
upvoted 0 times
...
...
Johnna
2 months ago
Wow, this question is really tricky! I'm going to have to think about this one carefully. The lack of character escaping is definitely a concern.
upvoted 0 times
...
Gilberto
2 months ago
I think the correct answer is C. The user input character string contains an XML tag that could be interpreted as part of the XML structure, potentially leading to a security vulnerability known as XML injection.
upvoted 0 times
Lauran
2 months ago
User2
upvoted 0 times
...
Royce
2 months ago
User1
upvoted 0 times
...
...
Selene
3 months ago
I'm not sure, but I think the correct answer is C.
upvoted 0 times
...
Yuki
3 months ago
I agree with Cristal, the query execution result should be B.
upvoted 0 times
...
Cristal
3 months ago
I think the answer is B.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77