exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 623 discussion

Actual exam question from Cisco's 350-701
Question #: 623
Topic #: 1
[All 350-701 Questions]

What are two examples of code injection vulnerabilities? (Choose two.)

  • A. XML external entity injection
  • B. cross-site scripting
  • C. session hijacking
  • D. SQL injection
  • E. arbitrary command injection
Show Suggested Answer Hide Answer
Suggested Answer: BD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
aa4a63c
1 month ago
Selected Answer: BC
Xss, SQL injections
upvoted 1 times
...
Pierre_Bouvier
3 months ago
Selected Answer: AD
Code injection vulnerabilities occur when an attacker is able to insert and execute malicious code into a program or query. Here’s how the correct examples fit: XML External Entity (XXE) Injection (A): This occurs when an application processes XML input containing a reference to an external entity. Attackers can exploit XXE vulnerabilities to extract sensitive data, perform denial of service (DoS), or execute remote requests. SQL Injection (D): In this attack, an attacker inserts malicious SQL statements into an input field to manipulate the database. SQL injection can lead to unauthorized access to sensitive data, database corruption, or even full system compromise.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago