Download Cisco.350-701.CertDumps.2021-08-05.324q.tqb

Download Exam

File Info

Exam Implementing and Operating Cisco Security Core Technologies
Number 350-701
File Name Cisco.350-701.CertDumps.2021-08-05.324q.tqb
Size 9 MB
Posted Aug 05, 2021
Download Cisco.350-701.CertDumps.2021-08-05.324q.tqb

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

In which form of attack is alternate encoding, such as hexadecimal representation, most often observed?


  1. Smurf
  2. distributed denial of service
  3. cross-site scripting
  4. rootkit exploit
Correct answer: C
Explanation:
Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The data is usually gathered in the form of a hyperlink which contains malicious content within it. The user will most likely click on this link from another website, instant message, or simply just reading a web board or email message. Usually the attacker will encode the malicious portion of the link to the site in HEX (or other encoding methods)so the request is less suspicious looking to the user when clicked on. For example the code below is written in hex:<a href=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29>Click Here</a> is equivalent to:<a href=javascript:alert('XSS')>Click Here</a>Note: In the format “&#xhhhh“, hhhh is the code point in hexadecimal form.
Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. 
The data is usually gathered in the form of a hyperlink which contains malicious content within it. 
The user will most likely click on this link from another website, instant message, or simply just reading a web board or email message. 
Usually the attacker will encode the malicious portion of the link to the site in HEX (or other encoding methods)so the request is less suspicious looking to the user when clicked on. 
For example the code below is written in hex:
<a href=&#x6A&#x61&#x76&#x61&#x73&#x63&#x72&#x69&#x70&#x74&#x3A&#x61&#x6C&#x65&#x72&#x74&#x28&#x27&#x58&#x53&#x53&#x27&#x29>Click Here</a> 
is equivalent to:
<a href=javascript:alert('XSS')>Click Here</a>
Note: In the format “&#xhhhh“, hhhh is the code point in hexadecimal form.



Question 2

Which flaw does an attacker leverage when exploiting SQL injection vulnerabilities?


  1. user input validation in a web page or web application
  2. Linux and Windows operating systems
  3. database
  4. web page images
Correct answer: A
Explanation:
SQL injection usually occurs when you ask a user for input, like their username/userid, but the user gives (“injects”) you an SQL statement that you will unknowingly run on your database. For example:Look at the following example, which creates a SELECT statement by adding a variable (txtUserId) to a select string. The variable is fetched from user input (getRequestString):txtUserId = getRequestString(“UserId”); txtSQL = “SELECT * FROM Users WHERE UserId = ” + txtUserId; If user enter something like this: “100 OR 1=1” then the SQL statement will look like this:SELECT * FROM Users WHERE UserId = 100 OR 1=1; The SQL above is valid and will return ALL rows from the “Users” table, since OR 1=1 is always TRUE. A hacker might get access to all the user names and passwords in this database.
SQL injection usually occurs when you ask a user for input, like their username/userid, but the user gives (“injects”) you an SQL statement that you will unknowingly run on your database. For example:
Look at the following example, which creates a SELECT statement by adding a variable (txtUserId) to a select 
string. The variable is fetched from user input (getRequestString):
txtUserId = getRequestString(“UserId”); 
txtSQL = “SELECT * FROM Users WHERE UserId = ” + txtUserId; 
If user enter something like this: “100 OR 1=1” then the SQL statement will look like this:
SELECT * FROM Users WHERE UserId = 100 OR 1=1; 
The SQL above is valid and will return ALL rows from the “Users” table, since OR 1=1 is always TRUE. A hacker might get access to all the user names and passwords in this database.



Question 3

Which two prevention techniques are used to mitigate SQL injection attacks? (Choose two)


  1. Check integer, float, or Boolean string parameters to ensure accurate values.
  2. Use prepared statements and parameterized queries.
  3. Secure the connection between the web and the app tier.
  4. Write SQL code instead of using object-relational mapping libraries.
  5. Block SQL code execution in the web application database login.
Correct answer: AB









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files