exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 89 discussion

Actual exam question from CompTIA's CS0-003
Question #: 89
Topic #: 1
[All CS0-003 Questions]

A SOC analyst identifies the following content while examining the output of a debugger command over a client-server application:

getConnection(database01,"alpha" ,"AxTv.127GdCx94GTd");

Which of the following is the most likely vulnerability in this system?

  • A. Lack of input validation
  • B. SQL injection
  • C. Hard-coded credential
  • D. Buffer overflow
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
chaddman
Highly Voted 1 year, 6 months ago
Selected Answer: C
The most likely vulnerability in the given content is: C. Hard-coded credential In the provided content, the string "AxTv.127GdCx94GTd" appears to be a hard-coded credential (e.g., a password) embedded directly within the code. This is a security vulnerability because it means that the application is using a static, unchanging credential for database access, which is generally not recommended for security reasons. Hard-coded credentials can be easily discovered by attackers who have access to the application's code or binary, and they can potentially lead to unauthorized access to sensitive data or systems. It's essential to store credentials securely and use techniques like encryption, secure key management, and password rotation to enhance security.
upvoted 6 times
...
luiiizsoares
Most Recent 5 months, 2 weeks ago
Selected Answer: C
Correct Answer: C. Hard-coded credential Analysis: The snippet getConnection(database01,"alpha" ,"AxTv.127GdCx94GTd"); suggests that the credentials (in this case, a password) are directly embedded in the code. This practice, known as hard-coded credentials, is a security risk because it can be easily extracted by anyone with access to the code or debugging information. Explanation of Other Options: A. Lack of input validation: This generally refers to improper validation of user inputs, which is not evident in the provided code snippet. B. SQL injection: This involves injecting malicious SQL code into a query, but the provided code snippet does not show any user inputs being incorporated into a SQL statement. D. Buffer overflow: This vulnerability occurs when more data is written to a buffer than it can hold, leading to overwriting of adjacent memory. The given code snippet does not indicate any buffer management issues.
upvoted 1 times
...
c83335b
11 months, 3 weeks ago
Selected Answer: A
Is asking for vulnerability on the system so it most be A
upvoted 1 times
Koekjesdoos_111
6 months, 2 weeks ago
Hardcoded passwords is also a vulnerability..
upvoted 1 times
...
...
thisguyfucks
1 year, 1 month ago
Selected Answer: C
I think the answer is C
upvoted 2 times
...
kmordalv
1 year, 8 months ago
Selected Answer: C
The given content appears to be a call to a function that includes arguments to establish a connection to a database within a client-server application. Therefore, the given answer seems to be the correct answer.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago