exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 623 discussion

Actual exam question from Cisco's 350-701
Question #: 623
Topic #: 1
[All 350-701 Questions]

What are two examples of code injection vulnerabilities? (Choose two.)

  • A. XML external entity injection
  • B. cross-site scripting
  • C. session hijacking
  • D. SQL injection
  • E. arbitrary command injection
Show Suggested Answer Hide Answer
Suggested Answer: BD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
XanALaOM00
2 weeks, 6 days ago
Selected Answer: BD
On the Exam, Choose B and D, I don't see any reference to Answer A (External Entity Injection) in the official material, but I do for Answers B and D. /shrug, awful question
upvoted 1 times
...
XanALaOM00
2 weeks, 6 days ago
Selected Answer: AD
Another bad question from Cisco. more elaboration is needed for the question. If the question read specifically "Two Examples of Server Side Injection" then A and D are 100% correct as Cross-Site is Client Side. awful question because the answer here very well could be B and D if you put your blinders on to anything outside of Cisco material. The type of questions that make me feel like this exam truly is meant to brainwash you instead of test your knowledge.
upvoted 1 times
...
aa4a63c
2 months, 3 weeks ago
Selected Answer: BC
Xss, SQL injections
upvoted 1 times
...
Pierre_Bouvier
4 months, 3 weeks ago
Selected Answer: AD
Code injection vulnerabilities occur when an attacker is able to insert and execute malicious code into a program or query. Here’s how the correct examples fit: XML External Entity (XXE) Injection (A): This occurs when an application processes XML input containing a reference to an external entity. Attackers can exploit XXE vulnerabilities to extract sensitive data, perform denial of service (DoS), or execute remote requests. SQL Injection (D): In this attack, an attacker inserts malicious SQL statements into an input field to manipulate the database. SQL injection can lead to unauthorized access to sensitive data, database corruption, or even full system compromise.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...