Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM Exam CFA-001 Topic 4 Question 85 Discussion

Actual exam question for GAQM's CFA-001 exam
Question #: 85
Topic #: 4
[All CFA-001 Questions]

Which of the following attacks allows an attacker to access restricted directories, including application source code, configuration and critical system files, and to execute commands outside of the web server's root directory?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Elke
1 days ago
Ah, the good old directory traversal. The classic way to sneak past the web server's defenses and explore the hidden corners of the system. Time to see what secrets are lurking in those restricted directories.
upvoted 0 times
...
Cecil
6 days ago
Directory traversal, for sure. This is the ultimate way to get the goods on the application. I'll be browsing through their config files and source code faster than a cheetah chasing a gazelle.
upvoted 0 times
...
Andra
9 days ago
C'mon, this is a no-brainer. Directory traversal is the way to go if you want to access those juicy restricted directories. It's like having a backstage pass to the web server's dirty secrets.
upvoted 0 times
...
Youlanda
10 days ago
Aha, directory traversal! This attack lets me snoop around where I'm not supposed to go. Time to take a stroll through the file system, shall we?
upvoted 0 times
...
Sheridan
13 days ago
I'm not sure, but I think it could also be D) Security misconfiguration.
upvoted 0 times
...
Tennie
16 days ago
I agree with Quentin. Directory traversal allows access to restricted directories.
upvoted 0 times
...
Quentin
17 days ago
I think the answer is C) Directory traversal.
upvoted 0 times
...

Save Cancel