exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 46 discussion

Actual exam question from Cisco's 350-701
Question #: 46
Topic #: 1
[All 350-701 Questions]

An organization has two machines hosting web applications. Machine 1 is vulnerable to SQL injection while machine 2 is vulnerable to buffer overflows. What action would allow the attacker to gain access to machine 1 but not machine 2?

  • A. sniffing the packets between the two hosts
  • B. sending continuous pings
  • C. overflowing the buffer's memory
  • D. inserting malicious commands into the database
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Raajaa
Highly Voted 3 years, 7 months ago
D is the answer
upvoted 10 times
...
sull3y
Highly Voted 2 years ago
D. inserting malicious commands into the database. SQL injection is a type of security vulnerability that allows an attacker to insert malicious code into an SQL statement, allowing them to gain unauthorized access to a database or manipulate its data. This can be done by exploiting vulnerabilities in the way that user input is handled by a web application. So by inserting malicious commands into the database hosted on Machine 1, an attacker can gain access to the database and potentially steal or manipulate data. On the other hand, a buffer overflow is a type of security vulnerability that occurs when more data is written to a buffer than it can hold. This can cause the program to crash or execute arbitrary code, allowing an attacker to gain control of the affected machine. However, in this scenario, Machine 2 is vulnerable to buffer overflows, so overflowing the buffer's memory on Machine 2 would allow the attacker to gain access to Machine 2 but not to Machine 1.
upvoted 5 times
...
CyberGhost666
Most Recent 1 month, 3 weeks ago
Selected Answer: D
Correct answer is D
upvoted 1 times
...
Marshpillowz
10 months, 1 week ago
Selected Answer: D
D is right
upvoted 1 times
...
eriksm
1 year, 4 months ago
Selected Answer: D
D is the right answer
upvoted 1 times
...
Alizade
1 year, 4 months ago
Selected Answer: D
D. inserting malicious commands into the database
upvoted 1 times
...
eazy99
3 years, 4 months ago
Yup, D it is
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...