Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 312-50 Topic 1 Question 76 Discussion

Actual exam question for Eccouncil's 312-50 exam
Question #: 76
Topic #: 1
[All 312-50 Questions]

In an intricate web application architecture using an Oracle database, you, as a security analyst, have identified a potential SQL Injection attack surface. The database consists of 'x' tables, each with y columns. Each table contains z1 records. An attacker, well-versed in SQLi techniques, crafts 'u' SQL payloads, each attempting to extract maximum data from the database. The payloads include UNION SELECT' statements and 'DBMS_XSLPPOCESSOR.READ2CLOB' to read sensitive files. The attacker aims to maximize the total data extracted E=xyz'u'. Assuming 'x=4\ y=2\ and varying z' and 'u\ which situation is likely to result in the highest extracted data volume?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Florencia
10 months ago
Exactly. The tools used by penetration testers have more comprehensive vulnerability databases too.
upvoted 0 times
...
Myrtie
10 months ago
I agree. Penetration tests go further by actually trying to hack into the system.
upvoted 0 times
...
Talia
11 months ago
Yeah, that makes sense. Vulnerability scans only do host discovery and port scanning.
upvoted 0 times
...
Florencia
11 months ago
I think a penetration test is more thorough because it actively exploits vulnerabilities.
upvoted 0 times
...

Save Cancel
a