ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 151 - CS0-003 discussion

Report
Export

A company brings in a consultant to make improvements to its website. After the consultant leaves a web developer notices unusual activity on the website and submits a suspicious file containing the following code to the security team:

Which of the following did the consultant do?

A.
Implanted a backdoor
Answers
A.
Implanted a backdoor
B.
Implemented privilege escalation
Answers
B.
Implemented privilege escalation
C.
Implemented clickjacking
Answers
C.
Implemented clickjacking
D.
Patched the web server
Answers
D.
Patched the web server
Suggested answer: A

Explanation:

The correct answer is A. Implanted a backdoor.

A backdoor is a method that allows an unauthorized user to access a system or network without the permission or knowledge of the owner. A backdoor can be installed by exploiting a software vulnerability, by using malware, or by physically modifying the hardware or firmware of the device. A backdoor can be used for various malicious purposes, such as stealing data, installing malware, executing commands, or taking control of the system.

In this case, the consultant implanted a backdoor in the website by using an HTML and PHP code snippet that displays an image of a shutdown button and an alert message that says “Exit”. However, the code also echoes the remote address of the server, which means that it sends the IP address of the visitor to the attacker. This way, the attacker can identify and target the visitors of the website and use their IP addresses to launch further attacks or gain access to their devices.

The code snippet is an example of a clickjacking attack, which is a type of interface-based attack that tricks a user into clicking on a hidden or disguised element on a webpage. However, clickjacking is not the main goal of the consultant, but rather a means to implant the backdoor. Therefore, option C is incorrect.

Option B is also incorrect because privilege escalation is an attack technique that allows an attacker to gain higher or more permissions than they are supposed to have on a system or network. Privilege escalation can be achieved by exploiting a software vulnerability, by using malware, or by abusing misconfigurations or weak access controls. However, there is no evidence that the consultant implemented privilege escalation on the website or gained any elevated privileges.

Option D is also incorrect because patching is a process of applying updates to software to fix errors, improve performance, or enhance security. Patching can prevent or mitigate various types of attacks, such as exploits, malware infections, or denial-of-service attacks. However, there is no indication that the consultant patched the web server or improved its security in any way.

Reference:

1 What Is a Backdoor & How to Prevent Backdoor Attacks (2023)

2 What is Clickjacking? Tutorial & Examples | Web Security Academy

3 What Is Privilege Escalation and How It Relates to Web Security | Acunetix

4 What Is Patching? | Best Practices For Patch Management - cWatch Blog

asked 02/10/2024
shafinaaz hossenny
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first