Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam SY0-601 topic 1 question 433 discussion

Actual exam question from CompTIA's SY0-601
Question #: 433
Topic #: 1
[All SY0-601 Questions]

A security analyst is investigating a report from a penetration test. During the penetration test, consultants were able to download sensitive data from a back-end server. The back-end server was exposing an API that should have only been available from the company's mobile application. After reviewing the back-end server logs, the security analyst finds the following entries:



Which of the following is the most likely cause of the security control bypass?

  • A. IP address allow list
  • B. User-agent spoofing
  • C. WAF bypass
  • D. Referrer manipulation
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
krayxay
Highly Voted 1 year ago
This question was on the exam fyi. I passed today with a 751 after failing the first time with a 722. These are a help resource
upvoted 40 times
giancesarini2023
1 year ago
That's cool. Congratulations! Did a good percentage of the questions in this examtopics fall?
upvoted 3 times
...
...
mouettespaghetti
Highly Voted 1 year ago
-B Based on the provided information, the most likely cause of the security control bypass is user-agent spoofing. User-agent spoofing is a technique used by attackers to impersonate a legitimate user agent or mobile application to bypass security controls. In this case, the back-end server was exposing an API that should have only been available from the company's mobile application. By spoofing the user agent, the attacker was able to trick the back-end server into believing that the API request was coming from the legitimate mobile application, and therefore, was able to bypass the security control that was supposed to restrict access to the API to only the mobile application.
upvoted 8 times
...
sosa4547
Most Recent 4 days, 9 hours ago
I test on the 24th of May, I pray that I pass, or else I lose my job. I want to thank everyone on their contributions towards the discussions, they really help out. I will let you all know if I pass, and to help others, I'll add as many discussions as possible to confirm the right answer. I hate when people say the question was on the exam, but never say what they picked =(
upvoted 1 times
...
Dacoder
8 months, 3 weeks ago
Selected Answer: B
If you look at the data, the requests made as postman were failing, but after the user agent change they started to be successful.
upvoted 1 times
f6652ce
1 month, 1 week ago
How can you tell that they were successful using the different agent?
upvoted 1 times
Mehe323
1 week, 5 days ago
You need to look at the HTTP response codes, in the 200 means successful and in the 400 means you can't access them.
upvoted 1 times
...
...
...
LeonardSnart
11 months ago
Selected Answer: B
The following code listing displays the contents of a log file for an IIS web server. Notice that you can see the date and time that the request was made, the type of request (GET or POST), the file requested, and the client IP address that made the request. The last piece of information on the line is the user agent, which is the program used to make the request. Note that for brevity I have cut out any irrelevant information in the output. #Software: Microsoft Internet Information Services 6.0 #Version: 1.0 #Date: 2011-03-29 17:49:49 #Fields: date time cs-method cs-uri-stem s-port c-ip cs(User-Agent) 2011-03-29 17:49:49 GET /Default.htm 80 10.0.0.2 Mozilla... 2011-03-29 17:49:56 POST /process.asp 80 10.0.0.2 Mozilla... 2011-03-29 17:50:09 GET /deletecustomer.asp 80 10.0.0.2 Mozilla..." -Security+ Certification Study Guide Fourth Edition SY0-601 by Glen Clarke
upvoted 1 times
...
Selected Answer: B
User-agent spoofing is the practice of changing or falsifying the user-agent string sent by a web browser or other HTTP client to a web server. The user-agent string is a piece of information that is sent along with an HTTP request and identifies the type and version of the web browser or client being used. By spoofing the user-agent string, an attacker can trick a web server into thinking that a request is coming from a different browser or client than the one that is actually being used. User-agent spoofing can be used by attackers to evade detection and bypass security controls, such as web application firewalls (WAFs) or content filtering systems. For example, an attacker could send a request with a user-agent string that matches that of a known and trusted browser or client, in order to avoid being blocked or flagged as suspicious by a WAF or content filtering system. Alternatively, an attacker could send a request with a user-agent string that appears to come from a mobile device, in order to bypass security controls that are designed to block requests from desktop browsers.
upvoted 3 times
...
fouserd
1 year ago
Selected Answer: B
The most likely cause of the security control bypass in this scenario is User-agent spoofing. User-agent spoofing is a technique where an attacker manipulates the user-agent string sent by their client to the server to impersonate a different client. In this case, the attacker may have spoofed the user-agent string to make it appear as if the requests were coming from the company’s mobile application, allowing them to bypass security controls and access the API.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...