ExamGecko
Home Home / ISC / CCSP
Question list
Search
Search

Question 277 - CCSP discussion

Report
Export

Many different common threats exist against web-exposed services and applications. One attack involves attempting to leverage input fields to execute queries in a nested fashion that is unintended by the developers.

What type of attack is this?

A.
Injection
Answers
A.
Injection
B.
Missing function-level access control
Answers
B.
Missing function-level access control
C.
Cross-site scripting
Answers
C.
Cross-site scripting
D.
Cross-site request forgery
Answers
D.
Cross-site request forgery
Suggested answer: A

Explanation:

An injection attack is where a malicious actor sends commands or other arbitrary data through input and data fields with the intent of having the application or system execute the code as part of its normal processing and queries. This can trick an application into exposing data that is not intended or authorized to be exposed, or it can potentially allow an attacker to gain insight into configurations or security controls. Missing function-level access control exists where an application only checks for authorization during the initial login process and does not further validate with each function call. Cross-site request forgery occurs when an attack forces an authenticated user to send forged requests to an application running under their own access and credentials. Cross-site scripting occurs when an attacker is able to send untrusted data to a user's browser without going through validation processes.

asked 18/09/2024
Justin Schowalter
34 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first