ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 359 - SY0-601 discussion

Report
Export

A security analyst is investigating a report from a penetration test. During the penetration test, consultants were able to download sensitive data from a back-end server. The back-end server was exposing an API that should have only been available from the company’s mobile application. After reviewing the back-end server logs, the security analyst finds the following entries:

Which of the following is the most likely cause of the security control bypass?

A.
IP address allow list
Answers
A.
IP address allow list
B.
User-agent spoofing
Answers
B.
User-agent spoofing
C.
WAF bypass
Answers
C.
WAF bypass
D.
Referrer manipulation
Answers
D.
Referrer manipulation
Suggested answer: B

Explanation:

User-agent spoofing is a technique that involves changing the user-agent string of a web browser or other client to impersonate another browser or device. The user-agent string is a piece of information that identifies the client to the web server and can contain details such as the browser name, version, operating system, and device type. User-agent spoofing can be used to bypass security controls that rely on the user-agent string to determine the legitimacy of a request. In this scenario, the consultants were able to spoof the user-agent string of the company’s mobile application and access the API that should have been restricted to it.

asked 02/10/2024
Matt Smith
47 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first