exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 8 discussion

Actual exam question from Cisco's 350-701
Question #: 8
Topic #: 1
[All 350-701 Questions]

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?

  • A. user input validation in a web page or web application
  • B. Linux and Windows operating systems
  • C. database
  • D. web page images
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
kudlaaaaty
Highly Voted 5 years ago
should be A
upvoted 19 times
...
eazy99
Highly Voted 3 years, 9 months ago
This is a tricky question, and I believe the provided answer is correct and here is why. They ask what is the flaw that caused the attacker to exploit this vulnerability? I agree that the attacker uses the web application or the user input to exploit the vulnerability, and give commands to connect to the database and get everything needed about the database. But what where is the actual flaw? Was it A. the web application and the user input? No, it’s not, or it would be XSS vulnerability. The attacker leveraged a flaw in the Database, using the web application or the user input as a way to communicate with the Database and extract all the info about the database. With that being said, I believe that the provided answer is correct, and I will go with C.
upvoted 9 times
Dorr20
2 years, 2 months ago
The database exploitation is the end result, it's not the flaw
upvoted 3 times
...
otzu1
3 years, 2 months ago
The flaw is in the web application/user input as it did not have input validation. The database.
upvoted 2 times
...
...
Rockbo47
Most Recent 8 months, 4 weeks ago
Selected Answer: A
As others have highlighted already, the "flaw" would refer to the vulnerability which in this example would be the user input validation (or lack of). https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-dcnm-sql-inj-OAQOObP.html This is also verified in the above link... "CVE-2021-1248: Cisco DCNM SQL Injection Vulnerability A vulnerability in a REST API endpoint of Cisco DCNM could allow an authenticated, remote attacker with administrative privileges to execute arbitrary SQL commands on an affected device. This vulnerability is due to insufficient validation of user-supplied input to the API. An attacker with administrative privileges could exploit this vulnerability by sending a crafted request to the API"
upvoted 3 times
...
itsklk
2 years, 1 month ago
Selected Answer: A
Which "flaw" does. So its cause in my understanding
upvoted 1 times
...
nomanlands
2 years, 11 months ago
Selected Answer: A
Exploiting input validation at the source and destination. It isn't a flaw within the database itself.
upvoted 3 times
...
tom_1991
3 years ago
I believe the answer is C. The Database is unable to sanitize the data sent to it through the web page/application as it relies heavily on the web page/application to sanitize the code. That is the databases flaw. The attacker is leveraging the fact that the database can't do anything to prevent the attacker from sending the code. Very tricky question...
upvoted 2 times
...
TesterDude
3 years, 1 month ago
Selected Answer: A
Exploiting no data validation
upvoted 1 times
...
sheki2005
3 years, 1 month ago
for me the answer is C, because you can have systems which is using web to connect into database, so all the queries are coming from web to database, the user wont exploit web but database through web, so for me I will go with Database instead of web.
upvoted 1 times
...
brownbear505
3 years, 3 months ago
Selected Answer: A
To prevent SQL injection one means of preventing is input validation.
upvoted 1 times
...
elast1c
3 years, 4 months ago
Selected Answer: A
definitely A
upvoted 1 times
...
urathod
3 years, 5 months ago
Selected Answer: A
should be A
upvoted 1 times
...
efongvan
3 years, 5 months ago
Answer is definitely A.
upvoted 2 times
...
PrinM
3 years, 6 months ago
Selected Answer: A
should be A
upvoted 2 times
...
bassfunk
3 years, 6 months ago
Selected Answer: A
Answer is definitely A. Input validation is the vulnerability, not the database.
upvoted 2 times
...
jaciro11
3 years, 7 months ago
Selected Answer: A
The answer is A
upvoted 2 times
...
ExamP
3 years, 9 months ago
A https://www.cisco.com/c/en/us/support/docs/csa/cisco-sa-dcnm-sql-inj-OAQOObP.html
upvoted 2 times
...
Raajaa
3 years, 12 months ago
I go with A
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...