Which of the answers listed below refers to a security vulnerability that enables inserting malicious code into input fields, such as search bars or login forms, to execute unauthorized commands on a database?
CompTIA Security+ SY0-701 Practice Test 8 By Mr. B

Quiz
•
Computers
•
12th Grade
•
Medium
Cyber Professor - Mr. B
Used 4+ times
FREE Resource
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 4 pts
RCE
SQLi
XSS
CSRF
Answer explanation
SQLi, or SQL Injection, is a security vulnerability that allows attackers to insert malicious SQL code into input fields, enabling them to execute unauthorized commands on a database. This makes SQLi the correct answer.
2.
MULTIPLE CHOICE QUESTION
1 min • 4 pts
Which of the following indicates an SQL injection attack attempt?
DELETE FROM itemDB WHERE itemID = '1';
SELECT * FROM users WHERE userName = 'Alice' AND password = '' OR '1' = '1';
DROP TABLE itemDB;
SELECT * FROM users WHERE email = 'example@example.com' AND password = '';
Answer explanation
The correct choice indicates an SQL injection attempt by using 'OR '1' = '1'', which can bypass authentication. This technique exploits vulnerabilities in SQL queries to manipulate database access.
3.
MULTIPLE SELECT QUESTION
1 min • 4 pts
Which of the answers listed below describe the characteristics of a cross-site scripting attack? (Select 3 answers)
Exploits the trust a user's web browser has in a website
A malicious script is injected into a trusted website
User's browser executes attacker's script
Exploits the trust a website has in the user's web browser
A user is tricked by an attacker into submitting unauthorized web requests
Answer explanation
Cross-site scripting (XSS) attacks exploit the trust a user's browser has in a website by injecting a malicious script into a trusted site, which the browser then executes, allowing attackers to manipulate user data.
4.
MULTIPLE CHOICE QUESTION
1 min • 4 pts
Which of the following answers refers to a type of software embedded into a hardware chip?
Firmware
Middleware
Device driver
Machine code
Answer explanation
Firmware is a type of software specifically designed to be embedded into hardware chips, providing low-level control for the device. Unlike middleware or device drivers, firmware operates closely with the hardware.
5.
MULTIPLE CHOICE QUESTION
1 min • 4 pts
Which of the terms listed below refers to a situation in which a product or service may no longer receive security patches or other updates, making it more vulnerable to attack?
EOL
ALM
EOS
SDLC
Answer explanation
EOL stands for 'End of Life', indicating that a product or service will no longer receive updates or security patches, increasing its vulnerability to attacks. This makes EOL the correct choice for the question.
6.
MULTIPLE CHOICE QUESTION
1 min • 4 pts
What is the main vulnerability related to legacy hardware?
Compatibility issues
Lack of security updates and patches
Worn-out physical components
Lack of skilled personnel to run it and maintain it
Answer explanation
The main vulnerability of legacy hardware is the lack of security updates and patches, making it susceptible to cyber threats. Without regular updates, these systems cannot defend against new vulnerabilities.
7.
MULTIPLE CHOICE QUESTION
1 min • 4 pts
Which of the following answers refers to a virtualization-related vulnerability where virtualized assets allocated to one VM are improperly isolated and can be accessed or compromised by another VM?
Resource reuse
Privilege escalation
Resource exhaustion
Concurrent session usage
Answer explanation
Resource reuse refers to a vulnerability in virtualization where resources allocated to one VM can be accessed by another VM due to improper isolation, leading to potential data breaches or compromises.
Create a free account and access millions of resources
Similar Resources on Quizizz
21 questions
L3: Understanding Security Policies

Quiz
•
9th - 12th Grade
21 questions
Identifying Security Threats

Quiz
•
9th - 12th Grade
25 questions
Module 1.1: Common Threats

Quiz
•
11th Grade - University
24 questions
032_Cross-site Scripting – CompTIA Security+ SY0-701 – 2.3

Quiz
•
9th Grade - University
21 questions
Hackers & Cyber Attacks

Quiz
•
12th Grade
23 questions
Network&security_basics

Quiz
•
12th Grade
20 questions
036_Supply Chain Vulnerabilities – CompTIA Security+

Quiz
•
9th - 12th Grade
30 questions
Data Safety & Best Practices

Quiz
•
9th - 12th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University