ExamGecko
Question list
Search
Search

Related questions











Question 184 - 200-201 discussion

Report
Export

Refer to the exhibit.

What is occurring within the exhibit?

A.

regular GET requests

Answers
A.

regular GET requests

B.

XML External Entities attack

Answers
B.

XML External Entities attack

C.

insecure deserialization

Answers
C.

insecure deserialization

D.

cross-site scripting attack

Answers
D.

cross-site scripting attack

Suggested answer: A

Explanation:

Based on the image details, the exhibit shows a series of HTTP requests with the method GET, which are used to retrieve data from a web server. There is no evidence of any malicious payload or parameter in these requests, so they are likely regular GET requests. The other options are types of web application attacks that exploit different vulnerabilities, such as XML External Entities, insecure deserialization, and cross-site scripting.Reference:=Cisco Cybersecurity

https://github.com/gwroblew/detectXSSlib/blob/master/test/attacks.txt

asked 07/10/2024
Lascelles Johnson
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first