ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 211 - CV0-004 discussion

Report
Export

An organization's critical data was exfiltrated from a computer system in a cyberattack. A cloud analyst wants to identify the root cause and is reviewing the following security logs of a software web application:

'2021/12/18 09:33:12' '10. 34. 32.18' '104. 224. 123. 119' 'POST / login.php?u=administrator&p=or%201%20=1'

'2021/12/18 09:33:13' '10.34. 32.18' '104. 224. 123.119' 'POST /login. php?u=administrator&p=%27%0A'

'2021/12/18 09:33:14' '10. 34. 32.18' '104. 224. 123. 119' 'POST /login. php?u=administrator&p=%26'

'2021/12/18 09:33:17' '10.34. 32.18' '104. 224. 123.119' 'POST / login.php?u=administrator&p=%3B'

'2021/12/18 09:33:12' '10.34. 32. 18' '104. 224. 123. 119' 'POST / login. php?u=admin&p=or%201%20=1'

'2021/12/18 09:33:19' '10.34.32.18' '104. 224. 123.119' 'POST / login. php?u=admin&p=%27%0A'

'2021/12/18 09:33:21' '10. 34. 32.18' '104.224. 123.119' 'POST / login. php?u=admin&p=%26'

'2021/12/18 09:33:23' '10. 34. 32.18' '104. 224. 123.119' 'POST / login. php?u=admin&p=%3B'

Which of the following types of attacks occurred?

A.
SQL injection
Answers
A.
SQL injection
B.
Cross-site scripting
Answers
B.
Cross-site scripting
C.
Reuse of leaked credentials
Answers
C.
Reuse of leaked credentials
D.
Privilege escalation
Answers
D.
Privilege escalation
Suggested answer: A

Explanation:

The security logs of the software web application show patterns that are typical of an SQL injection attack. This is evidenced by the inclusion of SQL syntax in the user input fields in an attempt to manipulate the database.

Reference: CompTIA Cloud+ Study Guide (Exam CV0-004) - Chapter on Cloud Security Threats

asked 02/10/2024
Zden Bohm Autocont a.s.
27 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first