ExamGecko
Question list
Search
Search

Question 631 - 350-701 discussion

Report
Export

A security test performed on one of the applications shows that user input is not validated. Which security vulnerability is the application more susceptible to because of this lack of validation?

A.

denial -of-service

Answers
A.

denial -of-service

B.

cross-site request forgery

Answers
B.

cross-site request forgery

C.

man-in-the-middle

Answers
C.

man-in-the-middle

D.

SQL injection

Answers
D.

SQL injection

Suggested answer: D

Explanation:

An application that does not validate user input is particularly susceptible to SQL injection attacks. In an SQL injection attack, an attacker can insert or 'inject' a SQL query via the input data from the client to the application. Due to the lack of validation, the malicious SQL commands are executed by the database server, leading to unauthorized access or manipulation of the database.

asked 10/10/2024
Christodoulos Chiras
29 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first