exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 49 discussion

Actual exam question from CompTIA's CS0-002
Question #: 49
Topic #: 1
[All CS0-002 Questions]

A security analyst is running a tool against an executable of an unknown source. The input supplied by the tool to the executable program and the output from the executable are shown below:

Which of the following should the analyst report after viewing this information?

  • A. A dynamic library that is needed by the executable is missing.
  • B. Input can be crafted to trigger an injection attack in the executable.
  • C. The tool caused a buffer overflow in the executable's memory.
  • D. The executable attempted to execute a malicious command.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Bayoneh
1 year, 7 months ago
Guys, I will point at an obvious here but let's do each other a favor and not comment if not backing your answer with a reason. Apart from being useless, only "I am thinking B or B is the correct answer" also hide the comments that provide meaningful information. Cheers
upvoted 4 times
...
2Fish
2 years, 3 months ago
I am thinking B here as well.
upvoted 1 times
...
Q23
2 years, 4 months ago
the question shows the input and outputs. If the input can be crafted to trigger an injection attack, and the output reveals "command not found" then the executable did in fact attempt to execute a malicious or untrusted command after all. Both answers are correct, but D validates a command was already entered
upvoted 1 times
AaronS1990
2 years, 4 months ago
I agree that it validates it was entered but was it malicious? I don't think so
upvoted 1 times
...
...
MrRobotJ
2 years, 7 months ago
Selected Answer: B
B is the correct answer.
upvoted 3 times
...
Tascjfbosafj
2 years, 8 months ago
Selected Answer: B
It's B.
upvoted 2 times
...
R00ted
2 years, 9 months ago
Selected Answer: B
B. Input can be crafted to trigger an injection attack in the executable.
upvoted 2 times
...
adamhoms
2 years, 9 months ago
Selected Answer: B
Sure is B
upvoted 3 times
...
nonjabusiness
2 years, 9 months ago
Selected Answer: B
The command not found output could be caused by an issue with an environment path, using this, a malicious payload could be crafted and executed by leveraging the invalid path
upvoted 1 times
...
Merc16
2 years, 9 months ago
Selected Answer: D
D makes sense to me. For B, I think the application is performing input validation and that's why the statement "Command not found" was returned.
upvoted 1 times
...
cyberseckid
2 years, 9 months ago
I think its B
upvoted 1 times
...
TheSkyMan
2 years, 10 months ago
Pretty sure this is B: "In an injection attack, an attacker supplies untrusted input to a program. This input gets processed by an interpreter as part of a command or query. In turn, this alters the execution of that program." https://www.acunetix.com/blog/articles/injection-attacks/
upvoted 2 times
...
Laudy
2 years, 10 months ago
B makes the most sense to me.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...