Skip to main content

Posts

SQL Injection

  #cybersecurity #coursera #quiz #solution #network #hacking #IBM 1 . Question 1 A hacker tailoring his actions based on the database errors the application displays is an example of which type of SQL Injection attack? 1 / 1  point Error-based UNION-based Out of Band Blind injection Correct Correct, error-based 2 . Question 2 True or False: Use of prepared statements is an effective mitigation against SQL Injection attacks because it seperates the query structure from the query parameters. 1 / 1  point True False Correct Correct, Use of prepared statements is an effective mitigation against SQL Injection attacks because it seperates the query structure from the query parameters. 3 . Question 3 True or False: Native database errors should be hidden from the user to prevent hackers from gaining insight into the internal structure of your application. 1 / 1  point True False Correct Correct, Native database errors should be hidden from the...

Injection Vulnerability

  #cybersecurity #coursera #quiz #solution #network #injection #hacking 1 . Question 1 Which operating system is susceptible to OS Command Injection attacks? 1 / 1  point All operating systems are susceptible. Windows Linux MacOS Correct Correct, all operating systems are susceptible. 2 . Question 2 What is a possible impact of running commands thought OS shell interpreters such as sh, bash, cmd.exe and powershell.exe? 0 / 1  point Powershell.exe is resistant to OS Injection attacks but sh, bash and cmd.exe have no built-in security. It makes it more difficult for a hacker to inject additional commands or arguments. It makes it easier for a hacker to inject additional commands or arguments. Incorrect Incorrect, review the video OS injection Part 2. 3 . Question 3 True or False: Safe coding practice avoides using OS commands when it can be avoided. 1 / 1  point True False Correct Correct, Safe coding practice avoides using OS commands wh...