Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam SY0-701 Topic 1 Question 3 Discussion

Contribute your Thoughts:

Linwood
13 days ago
Hmm, I was leaning towards C) VM escape. That's where an attacker tries to break out of a virtual machine and access the underlying host system. But I suppose SQL injection is the more obvious choice here.
upvoted 0 times
...
Gianna
14 days ago
Yeah, I was thinking the same thing. SQL injection is the only option that really fits the description of 'taking advantage of database misconfigurations'. The other choices just don't seem as relevant.
upvoted 0 times
...
Nickolas
14 days ago
I agree with Sheron on this one. SQL injection is definitely the way to go here. It's a common attack vector that takes advantage of poor input sanitization in web applications.
upvoted 0 times
...
Sheron
16 days ago
Hmm, this is a tricky one. I think the answer has to be B) SQL injection. That's a classic technique where attackers try to exploit vulnerabilities in database queries to gain unauthorized access.
upvoted 0 times
Georgeanna
9 hours ago
I agree, B) SQL injection is the correct answer.
upvoted 0 times
...
...

Save Cancel