exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 266 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 266
Topic #: 1
[All 312-50v11 Questions]

Attempting an injection attack on a web server based on responses to True/False questions is called which of the following?

  • A. Compound SQLi
  • B. Blind SQLi
  • C. Classic SQLi
  • D. DMS-specific SQLi
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Daniel8660
6 months, 3 weeks ago
Selected Answer: B
Blind/Inferential SQL Injection Blind SQL Injection is used when a web application is vulnerable to an SQL injection, but the results of the injection are not visible to the attacker. Boolean-based blind SQL injection (sometimes called inferential SQL Injection) is performed by asking the right questions to the application database.Multiple valid statements evaluated as true or false are supplied in the affected parameter in the HTTP request. (P.2044/2028)
upvoted 3 times
...
Gerasz87
1 year ago
Selected Answer: B
Blind SQL injection is used when a web application is vulnerable to an SQL injection but the results of the injection are not visible to the attacker. The page with the vulnerability may not be one that displays data but will display differently depending on the results of a logical statement injected into the legitimate SQL statement called for that page. This type of attack has traditionally been considered time-intensive because a new statement needed to be crafted for each bit recovered, and depending on its structure, the attack may consist of many unsuccessful requests. Recent advancements have allowed each request to recover multiple bits, with no unsuccessful requests, allowing for more consistent and efficient extraction. There are several tools that can automate these attacks once the location of the vulnerability and the target information has been established. https://en.wikipedia.org/wiki/SQL_injection#Blind_SQL_injection
upvoted 2 times
...
Scryptic
1 year, 7 months ago
Blind SQL injection is nearly identical to normal SQL Injection, the only difference being the way the data is retrieved from the database. When the database does not output data to the web page, an attacker is forced to steal data by asking the database a series of true or false questions.
upvoted 3 times
...
ANDRESCB1988
1 year, 9 months ago
correct
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago