exam questions

Exam ECSAv10 All Questions

View all questions & answers for the ECSAv10 exam

Exam ECSAv10 topic 1 question 45 discussion

Actual exam question from ECCouncil's ECSAv10
Question #: 45
Topic #: 1
[All ECSAv10 Questions]

Veronica, a penetration tester at a top MNC company, is trying to breach the company's database as a part of SQLi penetration testing. She began to use the
SQLi techniques to test the database security level. She inserted new database commands into the SQL statement and appended a SQL Server EXECUTE command to the vulnerable SQL statements.
Which of the following SQLi techniques was used to attack the database?

  • A. Function call injection
  • B. File inclusion
  • C. Buffer Overflow
  • D. Code injection
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ttsang529
2 years, 8 months ago
5. Code Injections Description If the input is not sanitized, attackers may use code injection techniques such as SQLi and XSS Allows attackers to steal critical information such as session cookies and user credentials
upvoted 1 times
...
ttsang529
2 years, 8 months ago
Ans is D Code Injections
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...