In an intricate web application architecture using an Oracle database, you, as a security analyst, have identified a potential SQL Injection attack surface. The database consists of ‘x’ tables, each with ‘y’ columns. Each table contains ‘z’ records. An attacker, well-versed in SQLi techniques, crafts ‘u’ SQL payloads, each attempting to extract maximum data from the database. The payloads include ‘UNION SELECT’ statements and ‘DBMS_XSLPROCESSOR.READ2CLOB’ to read sensitive files. The attacker aims to maximize the total data extracted ‘E=xyz*u’. Assuming ‘x=4’, ‘y=2’, and varying ‘z’ and ‘u’, which situation is likely to result in the highest extracted data volume?

QuestionsCategory: 312-50v12In an intricate web application architecture using an Oracle database, you, as a security analyst, have identified a potential SQL Injection attack surface. The database consists of ‘x’ tables, each with ‘y’ columns. Each table contains ‘z’ records. An attacker, well-versed in SQLi techniques, crafts ‘u’ SQL payloads, each attempting to extract maximum data from the database. The payloads include ‘UNION SELECT’ statements and ‘DBMS_XSLPROCESSOR.READ2CLOB’ to read sensitive files. The attacker aims to maximize the total data extracted ‘E=xyz*u’. Assuming ‘x=4’, ‘y=2’, and varying ‘z’ and ‘u’, which situation is likely to result in the highest extracted data volume?
Admin Staff asked 1 year ago
In an intricate web application architecture using an Oracle database, you, as a security analyst, have identified a potential SQL Injection attack surface. The database consists of 'x' tables, each with 'y' columns. Each table contains 'z' records. An attacker, well-versed in SQLi techniques, crafts 'u' SQL payloads, each attempting to extract maximum data from the database. The payloads include 'UNION SELECT' statements and 'DBMS_XSLPROCESSOR.READ2CLOB' to read sensitive files. The attacker aims to maximize the total data extracted 'E=xyz*u'. Assuming 'x=4', 'y=2', and varying 'z' and 'u', which situation is likely to result in the highest extracted data volume?

A. z=600, u=2: The attacker devises 2 SQL payloads, each aimed at tables holding 600 records, affecting all columns across all tables.

B. z=550, u=2: Here, the attacker formulates 2 SQL payloads and directs them towards tables containing 550 records, impacting all columns and tables.

C. z=500, u=3: The attacker creates 3 SQL payloads and targets tables with 500 records each, exploiting all columns and tables.

D. z=400, u=4: The attacker constructs 4 SQL payloads, each focusing on tables with 400 records, influencing all columns of all tables.










Correct Answer: D

This question is in 312-50v12 exam
For getting CEH Certificate


Next Post

Recommended

Welcome Back!

Login to your account below

Create New Account!

Fill the forms below to register

Retrieve your password

Please enter your username or email address to reset your password.