ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 346 - CAS-004 discussion

Report
Export

A network administrator who manages a Linux web server notices the following traffic:

http://corr.ptia.org/.../.../.../... /etc./shadow

Which of the following Is the BEST action for the network administrator to take to defend against this type of web attack?

A.
Validate the server certificate and trust chain.
Answers
A.
Validate the server certificate and trust chain.
B.
Validate the server input and append the input to the base directory path.
Answers
B.
Validate the server input and append the input to the base directory path.
C.
Validate that the server is not deployed with default account credentials.
Answers
C.
Validate that the server is not deployed with default account credentials.
D.
Validate that multifactor authentication is enabled on the server for all user accounts.
Answers
D.
Validate that multifactor authentication is enabled on the server for all user accounts.
Suggested answer: B

Explanation:

The network administrator is noticing a web attack that attempts to access the /etc/shadow file on a Linux web server. The /etc/shadow file contains the encrypted passwords of all users on the system

and is a common target for attackers. The attack uses a technique called directory traversal, which exploits a vulnerability in the web application that allows an attacker to access files or directories

outside of the intended scope by manipulating the file path.

Validating the server input and appending the input to the base directory path would be the best action for the network administrator to take to defend against this type of web attack, because it would:

Check the user input for any errors, malicious data, or unexpected values before processing it by the web application.

Prevent directory traversal by ensuring that the user input is always relative to the base directory path of the web application, and not absolute to the root directory of the web server.

Deny access to any files or directories that are not part of the web application’s scope or functionality.

asked 02/10/2024
Khalfan KAABI
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first