exam questions

Exam 312-50v10 All Questions

View all questions & answers for the 312-50v10 exam

Exam 312-50v10 topic 1 question 50 discussion

Actual exam question from ECCouncil's 312-50v10
Question #: 50
Topic #: 1
[All 312-50v10 Questions]

Code injection is a form of attack in which a malicious user:

  • A. Inserts text into a data field that gets interpreted as code
  • B. Gets the server to execute arbitrary code using a buffer overflow
  • C. Inserts additional code into the JavaScript running in the browser
  • D. Gains access to the codebase on the server and inserts new code
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
MagicianRecon
1 year, 1 month ago
Correct answer is B. Code injection and RCE are the same thing.
upvoted 1 times
datastream
11 months, 3 weeks ago
B isn't correct as it doesn't involve a buffer overflow. A is the correct answer. Quoted from official course-- "Injection flaws are web application vulnerabilities that allow untrusted data to be interpreted and executed as part of a command or query. Attackers exploit injection flaws by constructing malicious commands or queries that result in data loss or corruption, lack of accountability, or denial of access. Injection flaws are prevalent in legacy code, often found in SQL, LDAP, and XPath queries, etc. and can be easily discovered by application vulnerability scanners and fuzzers. Attackers inject malicious code, commands, or scripts in the input gates of flawed web applications in such a way that the applications interpret and run with the newly supplied malicious input, which in turn allows them to extract sensitive information. By exploiting injection flaws in web applications, attackers can easily read, write, delete, and update any data (i.e., relevant or irrelevant to that particular application)."
upvoted 3 times
...
...
jagadeesh666
1 year, 2 months ago
Code injection is the exploitation of a computer bug that is caused by processing invalid data. Injection is used by an attacker to introduce (or "inject") code into a vulnerable computer program and change the course of execution.
upvoted 1 times
...
nsamuel204
1 year, 4 months ago
Snort is an open source network intrusion detection system (NIDS) created by Martin Roesch. Snort is a packet sniffer that monitors network traffic in real time, scrutinizing each packet closely to detect a dangerous payload or suspicious anomalies.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...