Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam ECSS Topic 2 Question 75 Discussion

Actual exam question for Eccouncil's ECSS exam
Question #: 75
Topic #: 2
[All ECSS Questions]

Morris, an attacker, targeted an application server to manipulate its services. He succeeded by employing input validation attacks such as XSS that exploited vulnerabilities present in the programming logic of an application. Identify the web application layer in which Morris has manipulated the programming logic.

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Bulah
3 months ago
I bet Morris was sitting there, rubbing his hands together, thinking 'Time to hack the Presentation layer! Is that a window or a door?'
upvoted 0 times
Lenita
1 months ago
C) Database layer
upvoted 0 times
...
Stefania
1 months ago
B) Presentation layer
upvoted 0 times
...
Elly
2 months ago
A) Business layer
upvoted 0 times
...
...
Alita
3 months ago
I believe Morris targeted the Business layer because that's where the application's business logic is implemented.
upvoted 0 times
...
Georgiana
3 months ago
I agree with Kindra. The Presentation layer is responsible for handling user interface and input validation.
upvoted 0 times
...
Anglea
3 months ago
You guys are overthinking this. The answer is clearly C) Database layer. That's where all the juicy data is stored, so naturally, that's where Morris would target.
upvoted 0 times
Latrice
2 months ago
You guys are overthinking this. The answer is clearly C) Database layer. That's where all the juicy data is stored, so naturally, that's where Morris would target.
upvoted 0 times
...
Elza
2 months ago
D) Client layer
upvoted 0 times
...
Eulah
2 months ago
C) Database layer
upvoted 0 times
...
Cherelle
2 months ago
B) Presentation layer
upvoted 0 times
...
Carylon
2 months ago
A) Business layer
upvoted 0 times
...
Remona
2 months ago
You guys are overthinking this. The answer is clearly C) Database layer. That's where all the juicy data is stored, so naturally, that's where Morris would target.
upvoted 0 times
...
Mozell
2 months ago
D) Client layer
upvoted 0 times
...
Flo
2 months ago
C) Database layer
upvoted 0 times
...
Buck
2 months ago
B) Presentation layer
upvoted 0 times
...
Chanel
3 months ago
A) Business layer
upvoted 0 times
...
...
Kindra
3 months ago
I think Morris manipulated the programming logic in the Presentation layer.
upvoted 0 times
...
Barb
3 months ago
Nah, it's gotta be the Client layer. Morris was messing with the client-side code, like JavaScript, to pull off those XSS attacks.
upvoted 0 times
...
Truman
3 months ago
Wait, isn't it the Business layer? That's where the core application logic resides, right?
upvoted 0 times
...
Dong
3 months ago
I think the answer is B) Presentation layer. Morris manipulated the programming logic in the user interface layer of the application.
upvoted 0 times
Margarett
2 months ago
B) Presentation layer is correct. It's where Morris exploited vulnerabilities in the programming logic.
upvoted 0 times
...
Long
2 months ago
I agree, Morris targeted the Presentation layer to manipulate the application's services.
upvoted 0 times
...
Rima
2 months ago
D) Client layer
upvoted 0 times
...
Kent
2 months ago
C) Database layer
upvoted 0 times
...
Elza
3 months ago
B) Presentation layer
upvoted 0 times
...
Gerry
3 months ago
A) Business layer
upvoted 0 times
...
...

Save Cancel