Code injection vulnerabilities occur when an attacker is able to insert and execute malicious code into a program or query. Here’s how the correct examples fit:
XML External Entity (XXE) Injection (A):
This occurs when an application processes XML input containing a reference to an external entity.
Attackers can exploit XXE vulnerabilities to extract sensitive data, perform denial of service (DoS), or execute remote requests.
SQL Injection (D):
In this attack, an attacker inserts malicious SQL statements into an input field to manipulate the database.
SQL injection can lead to unauthorized access to sensitive data, database corruption, or even full system compromise.
upvoted 2 times
...
This section is not available anymore. Please use the main Exam Page.350-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
aa4a63c
1 month agoPierre_Bouvier
3 months ago