ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 44 - ECSS discussion

Report
Export

Morris, an attacker, targeted an application server to manipulate its services. He succeeded by employing input validation attacks such as XSS that exploited vulnerabilities present in the programming logic of an application. Identify the web application layer in which Morris has manipulated the programming logic.

A.

Business layer

Answers
A.

Business layer

B.

Presentation layer

Answers
B.

Presentation layer

C.

Database layer

Answers
C.

Database layer

D.

Client layer

Answers
D.

Client layer

Suggested answer: B

Explanation:

Morris exploited vulnerabilities in theprogramming logic of an applicationby employinginput validation attackssuch asXSS (Cross-Site Scripting). Thepresentation layeris responsible for handling user interfaces, rendering content, and managing interactions between users and the application. It deals with how data is presented to users and how user input is processed.By manipulating the presentation layer, Morris was able to compromise the application's security.Reference: EC-Council Certified Security Specialist (E|CSS) documents and study guide12.

asked 24/10/2024
Min Soe Aye
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first