exam questions

Exam PT0-002 All Questions

View all questions & answers for the PT0-002 exam

Exam PT0-002 topic 1 question 326 discussion

Actual exam question from CompTIA's PT0-002
Question #: 326
Topic #: 1
[All PT0-002 Questions]

A penetration tester observes an application enforcing strict access controls. Which of the following would allow the tester to bypass these controls and successfully access the organization’s sensitive files?

  • A. Remote file inclusion
  • B. Cross-site scripting
  • C. SQL injection
  • D. Insecure direct object references
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
throughthefray
5 months, 2 weeks ago
Direct Object Reference allows a user to access pages directly by specifically knowing(or guessing) what it is that they are looking for. It allows users to bypass authentication and in some cases *cough* even paywalls. For example, one could use the URL of this webpage and alter it to access further questions without paying for them as long as they know how the website displays resources in its URL bar. (wink wink)
upvoted 4 times
study_study
3 weeks, 1 day ago
Agree with your answer. Tried it.. think it's locked down.
upvoted 1 times
...
...
Johhnymone
8 months, 3 weeks ago
Selected Answer: D
Insecure direct object references occur when an application provides direct access to objects based on user input, allowing attackers to bypass authorization and access sensitive files directly
upvoted 1 times
...
deeden
1 year, 1 month ago
Selected Answer: D
Thanks guys :) wish me luck tomorrow...
upvoted 3 times
Hedwig74
1 year ago
Well? How'd it go?
upvoted 1 times
...
deeden
1 year, 1 month ago
Apparently, input validation and sanitization is part of a strict access control, along with the usual AAAA, etc.
upvoted 1 times
...
...
041ba31
1 year, 1 month ago
Selected Answer: D
Insecure direct object references occur when an application provides direct access to objects based on user input, allowing attackers to bypass authorization and access sensitive files directly
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago