Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco 200-901 Exam - Topic 5 Question 97 Discussion

Actual exam question for Cisco's 200-901 exam
Question #: 97
Topic #: 5
[All 200-901 Questions]

Which type of threat occur when an attacker can send hostile data to an interpreter within an application?

Show Suggested Answer Hide Answer
Suggested Answer: D

Injection attacks occur when untrusted data is sent to an interpreter as part of a command or query. The attacker's hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization. Common types of injection attacks include SQL injection, command injection, and LDAP injection. These types of attacks exploit vulnerabilities in how an application processes input data, allowing attackers to inject malicious commands or queries into the system.


Cisco DevNet Associate Certification Guide: Chapter on Security, specifically on common web application vulnerabilities.

OWASP (Open Web Application Security Project) Top Ten Web Application Security Risks: Injection.

Contribute your Thoughts:

0/2000 characters
Tanja
3 months ago
Injection? Really? I didn't know it was that common!
upvoted 0 times
...
Lashanda
3 months ago
Injection is the right answer, no doubt about it.
upvoted 0 times
...
Fatima
3 months ago
I thought it was Cross-site scripting?
upvoted 0 times
...
Sharen
4 months ago
Wait, are we sure it's not Sensitive data exposure?
upvoted 0 times
...
Gail
4 months ago
Definitely Injection! That's a classic threat.
upvoted 0 times
...
Paola
4 months ago
I feel like I've seen a question like this before, and injection was definitely the answer.
upvoted 0 times
...
Olive
4 months ago
The term "hostile data" makes me lean towards injection, especially since it involves sending data to an interpreter.
upvoted 0 times
...
Rodrigo
5 months ago
I remember studying cross-site scripting, but that seems more about web pages than interpreters.
upvoted 0 times
...
Vivan
5 months ago
I think this might be related to injection attacks, but I'm not completely sure.
upvoted 0 times
...
Mitsue
5 months ago
Hmm, I'm a bit torn between injection and cross-site scripting for this one. They both involve an attacker sending malicious data to an application. I'll have to think about it a bit more, but I'm leaning towards injection as the best answer.
upvoted 0 times
...
Flo
5 months ago
I think the answer here is cross-site scripting (XSS). With XSS, an attacker can inject malicious scripts into a web application, which then get executed by the user's browser. That seems to fit the description in the question.
upvoted 0 times
...
Marcos
5 months ago
Okay, let me think this through. The question is asking about a threat where an attacker can send hostile data to an interpreter within an application. That sounds a lot like an injection attack to me, where the attacker injects malicious code that gets executed by the application. I'll go with option D, Injection.
upvoted 0 times
...
Mira
5 months ago
Hmm, I'm a bit unsure about this one. I know injection attacks are a common type of web application vulnerability, but I'm not totally confident which specific type of injection attack is being described here.
upvoted 0 times
...
Cherri
6 months ago
I'm pretty sure this is a question about injection attacks, where an attacker can send malicious data to an application and have it interpreted in a way that allows them to do something harmful.
upvoted 0 times
...
Pete
10 months ago
Definitely D) Injection. Gotta love those interpreters, always keeping us on our toes. Time to put my hacking skills to the test!
upvoted 0 times
Silva
9 months ago
Let's stay vigilant and keep our systems protected from any potential attacks.
upvoted 0 times
...
Gracia
9 months ago
I agree, we need to make sure our applications are secure from these kinds of threats.
upvoted 0 times
...
Richelle
10 months ago
Yeah, Injection attacks can be really dangerous. We have to be careful with our data.
upvoted 0 times
...
Mari
10 months ago
I think it's D) Injection too. Those attackers are always trying to mess with us.
upvoted 0 times
...
...
Lawrence
10 months ago
Haha, D) Injection all the way. It's like a game of 'guess the vulnerability' - and I'm feeling lucky today!
upvoted 0 times
Stephaine
9 months ago
User 3: D) Injection is definitely a tricky one to deal with, always have to stay on top of security measures.
upvoted 0 times
...
Caitlin
9 months ago
User 2: Caitlin is right, B) Sensitive data exposure can be really dangerous too.
upvoted 0 times
...
Raina
9 months ago
User 1: A) Cross-site scripting is also a common threat to watch out for.
upvoted 0 times
...
...
Merrilee
11 months ago
I'm not sure, but I think it could also be A) Cross-site scripting. It also involves sending hostile data to an interpreter, right?
upvoted 0 times
...
Rory
11 months ago
Injection, for sure. Can't let those malicious inputs slip through the cracks, right? I got your back, app security!
upvoted 0 times
Pamella
11 months ago
D) Injection
upvoted 0 times
...
Amie
11 months ago
A) Cross-site scripting
upvoted 0 times
...
...
Timothy
12 months ago
Oh man, this one's a toughie. I'm gonna go with D) Injection. Gotta keep those pesky hackers out, am I right?
upvoted 0 times
Elouise
10 months ago
I agree with you, D) Injection seems like the right answer.
upvoted 0 times
...
Cristal
10 months ago
Hmm, I'm leaning towards C) Broken authentication.
upvoted 0 times
...
Vincent
10 months ago
No way, I'm pretty sure it's D) Injection.
upvoted 0 times
...
Reita
10 months ago
I think it's A) Cross-site scripting.
upvoted 0 times
...
Trinidad
10 months ago
I agree with you, D) Injection is the correct answer.
upvoted 0 times
...
Brandon
10 months ago
I'm going with C) Broken authentication.
upvoted 0 times
...
Ellsworth
11 months ago
No way, it's definitely D) Injection.
upvoted 0 times
...
Iluminada
11 months ago
I think it's A) Cross-site scripting.
upvoted 0 times
...
...
Oliva
12 months ago
I agree with Casandra, Injection makes sense because it involves sending hostile data to an interpreter.
upvoted 0 times
...
Casandra
12 months ago
I think the answer is D) Injection.
upvoted 0 times
...

Save Cancel