Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

XML Exam I10-003 Topic 6 Question 56 Discussion

Actual exam question for XML's I10-003 exam
Question #: 56
Topic #: 6
[All I10-003 Questions]

See separate window.

A certain Web application displays user information according to user input via Web browser. The XML data managing user information is as shown in [example.xml] (separate window). The following [XQuery] is executed when the Web application retrieves user information from [example xml].

[XQuery]

{

fn:doc("example.xml")//data[userid = "(1)"][password = "(2)"]

}

At this time, the Web application completes the [XQuery] by replacing (1) and (2) with the user input character string, and executes the query.

No character escapes (e.g. convert "<" to "<") are performed for character string input by the user. Select two of the following that produces the query execution result in [Execution Result] (separate window) when the character string is as shown in each answer choice.

Show Suggested Answer Hide Answer
Suggested Answer: B, F

Contribute your Thoughts:

Broderick
9 days ago
Wow, this is a tricky one! I'm going to have to think outside the box. Option F is my choice - let's see what kind of mischief I can get up to.
upvoted 0 times
...
Keith
16 days ago
Option E seems like the safest bet here. I don't want to mess with anything too crazy that might get me in trouble.
upvoted 0 times
...
Ty
17 days ago
Ha! 'idorfn:true()' - that's a pretty funny way to try and bypass the authentication. Option C is my pick.
upvoted 0 times
...
Chantay
19 days ago
Aha, so they're using XQuery instead of SQL. Option D looks like it might be a good way to exploit that.
upvoted 0 times
...
Noble
20 days ago
But A seems to be the most logical choice based on the XQuery provided.
upvoted 0 times
...
Mee
22 days ago
I disagree, I believe the correct answer is B.
upvoted 0 times
...
Corrinne
25 days ago
Wow, that's a pretty sneaky query they've got there. I bet option F would give me some interesting results!
upvoted 0 times
Cruz
9 days ago
Be careful with that query, it could lead to unexpected outcomes.
upvoted 0 times
...
Ronnie
13 days ago
Option F might indeed give you some interesting results.
upvoted 0 times
...
...
Noble
1 months ago
I think the correct answer is A.
upvoted 0 times
...
Fernanda
1 months ago
Hmm, it looks like we have a classic SQL injection vulnerability here. I'll have to try option B and see if I can bypass the authentication.
upvoted 0 times
Vallie
21 days ago
Goldie: Agreed, let's test it out and see if we can access the user information.
upvoted 0 times
...
Goldie
23 days ago
User 2: Yeah, let's give it a try and see if we can exploit the vulnerability.
upvoted 0 times
...
Lynsey
1 months ago
User 1: I think option B might work for bypassing the authentication.
upvoted 0 times
...
...

Save Cancel