Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GIAC Exam GISF Topic 3 Question 67 Discussion

Actual exam question for GIAC's GISF exam
Question #: 67
Topic #: 3
[All GISF Questions]

Web applications play a vital role in deploying different databases with user accessibility on theInternet. Which of the following allows an attacker to get unauthorized access to the database of aWeb application by sending (attacking) user-supplied data to an interpreter as part of a commandor query

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Skye
2 months ago
Injection flaw? More like 'Injection Flawless'! Am I right, folks? Seriously though, this one's a no-brainer. Gotta keep those databases secure!
upvoted 0 times
Joesph
17 days ago
B) Malicious File Execution
upvoted 0 times
...
Tomas
27 days ago
Definitely! Injection flaws are a major vulnerability that attackers can exploit to access databases.
upvoted 0 times
...
Maryrose
1 months ago
A) Injection flaw
upvoted 0 times
...
...
Whitney
2 months ago
Cross Site Scripting? That's about injecting malicious scripts into web pages, not directly attacking the database. Injection flaw is the clear winner here.
upvoted 0 times
...
Eladia
2 months ago
Malicious File Execution? That's when an attacker tries to run their own program on the server. Not what this question is asking about. Injection flaw is the way to go!
upvoted 0 times
Julian
11 days ago
No, that's not the correct option for this scenario.
upvoted 0 times
...
Shawn
21 days ago
B) Malicious File Execution
upvoted 0 times
...
Talia
1 months ago
Exactly! Injection flaw allows an attacker to send user-supplied data to a database interpreter.
upvoted 0 times
...
Merri
1 months ago
A) Injection flaw
upvoted 0 times
...
...
Ollie
2 months ago
Cross Site Request Forgery? Nah, that's more about tricking users into performing unwanted actions on the website. This question is about getting unauthorized access to the database, so it's gotta be injection flaw.
upvoted 0 times
Isidra
1 months ago
Yeah, injection flaw allows attackers to send user-supplied data to the interpreter to access the database.
upvoted 0 times
...
Amina
1 months ago
I agree, injection flaw is the correct answer.
upvoted 0 times
...
...
Marnie
2 months ago
Injection flaw? That's the one! I remember learning about how attackers can sneak malicious code into user inputs and trick the application into executing it. Gotta watch out for those sneaky SQL injection attacks!
upvoted 0 times
...
Lynsey
2 months ago
I'm not sure, but Injection flaw does sound like the most likely answer.
upvoted 0 times
...
Dewitt
2 months ago
I agree with Roselle, Injection flaw allows attackers to access the database.
upvoted 0 times
...
Roselle
2 months ago
I think the answer is A) Injection flaw.
upvoted 0 times
...

Save Cancel