Skip to main content

Posts

Showing posts from January, 2022

Deep Dive - Injection Vulnerability

  #cybersecurity #coursera #quiz #solution #network  1 . Question 1 Which of the following statements is True? 1 point Injection attacks were ranked #1 on the OWASP Top 10 list in 2013 and again in 2017. Injection attacks were ranked #1 on the OWASP Top 10 list in 2013 but dropped below the top 10 in 2017. Injection attacks were ranked below the top 10 on the OWASP Top 10 list in 2013 but have risen to the #3 slot in 2017. Injection attacks are recognized by OWASP as important, but have never made the Top 10 list. 2 . Question 2 Which vulnerability is being exploited in an OS Command Injection attack? 1 point Vulnerabilities in the operating system shell interpreter. Improperly configured security settings in the MySQL database. Poor user input sanitation and unsafe execution of OS commands. Vulnerabilities in the operating system kernel. 3 . Question 3 What is a simple but effective way to protect against DLL hijacking? 1 point Avoid using DLL libraries in commercial applications whe