exam questions

Exam SY0-401 All Questions

View all questions & answers for the SY0-401 exam

Exam SY0-401 topic 3 question 98 discussion

Actual exam question from CompTIA's SY0-401
Question #: 98
Topic #: 3
[All SY0-401 Questions]

Sara, a hacker, is completing a website form to request a free coupon. The site has a field that limits the request to 3 or fewer coupons. While submitting the form,
Sara runs an application on her machine to intercept the HTTP POST command and change the field from 3 coupons to 30.
Which of the following was used to perform this attack?

  • A. SQL injection
  • B. XML injection
  • C. Packet sniffer
  • D. Proxy
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️
When a web user takes advantage of a weakness with SQL by entering values that they should not, it is known as a SQL injection attack. Similarly, when the user enters values that query XML (known as XPath) with values that take advantage of exploits, it is known as an XML injection attack. XPath works in a similar manner to SQL, except that it does not have the same levels of access control, and taking advantage of weaknesses within can return entire documents. The best way to prevent XML injection attacks is to filter the users input and sanitize it to make certain that it does not cause XPath to return more data than it should.

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Currently there are no comments in this discussion, be the first to comment!
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...