An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?
D. inserting malicious commands into the database.
SQL injection is a type of security vulnerability that allows an attacker to insert malicious code into an SQL statement, allowing them to gain unauthorized access to a database or manipulate its data. This can be done by exploiting vulnerabilities in the way that user input is handled by a web application. So by inserting malicious commands into the database hosted on Machine 1, an attacker can gain access to the database and potentially steal or manipulate data.
On the other hand, a buffer overflow is a type of security vulnerability that occurs when more data is written to a buffer than it can hold. This can cause the program to crash or execute arbitrary code, allowing an attacker to gain control of the affected machine. However, in this scenario, Machine 2 is vulnerable to buffer overflows, so overflowing the buffer's memory on Machine 2 would allow the attacker to gain access to Machine 2 but not to Machine 1.
This section is not available anymore. Please use the main Exam Page.350-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Raajaa
Highly Voted 3 years, 7 months agosull3y
Highly Voted 2 years agoCyberGhost666
Most Recent 1 month, 3 weeks agoMarshpillowz
10 months, 1 week agoeriksm
1 year, 4 months agoAlizade
1 year, 4 months agoeazy99
3 years, 4 months ago