Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v10 All Questions

View all questions & answers for the 312-50v10 exam

Exam 312-50v10 topic 1 question 3 discussion

Actual exam question from ECCouncil's 312-50v10
Question #: 3
Topic #: 1
[All 312-50v10 Questions]

If an attacker uses the command SELECT*FROM user WHERE name = "˜x' AND userid IS NULL; --"˜; which type of SQL injection attack is the attacker performing?

  • A. End of Line Comment
  • B. UNION SQL Injection
  • C. Illegal/Logically Incorrect Query
  • D. Tautology
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
[Removed]
2 months, 4 weeks ago
Selected Answer: A
The correct answer is A. End of Line Comment. The -- sequence is used to comment out the rest of the SQL query, potentially altering the intended query execution.
upvoted 1 times
...
Yebi
1 year, 10 months ago
Selected Answer: A
The correct Answer is "A. End of Line Comment" by official EC-Council documentation. End of Line Comment After injecting the code into a specific field, legitimate code that follows is nullified using end of line comments SELECT * FROM user WHERE name = 'x' AND userid IS NULL; --';
upvoted 2 times
...
Genesis777
1 year, 10 months ago
Its A: In CEHv11 pg 2032 - End of line Comment. After injecting the code into a specific field, legitimate code that follows is nullified using end of the line.
upvoted 1 times
...
cristina22
1 year, 10 months ago
Answer is A: End of Line Comment: After injecting the code into a specific field, legitimate code that follows is nullified using end of line comments SELECT * FROM user WHERE name = 'x' AND userid IS NULL; --';
upvoted 1 times
...
Silascarter
3 years ago
Selected Answer: C
Answer is C. EC Council CEHv11 Page 2017 Illegal/Logically Incorrect Query An attacker may gain knowledge by injecting illegal/logically incorrect requests such as injectable parameters, data types, names of tables, and so on. In this SQL injection attack, an attacker intentionally sends an incorrect query to the database to generate an error message that may be useful for performing further attacks. This technique may help an attacker to extract the structure of the underlying database. For example, to find the column name, an attacker may give the following malicious input: Username: 'Bob" The resultant query will be SELECT * FROM Users WHERE UserName = 'Bob"' AND password = After executing the above query, the database may return the following error message: "Incorrect Syntax near 'Bob'. Unclosed quotation mark after the character string '' AND Password='xxx''."
upvoted 2 times
...
ccessex
3 years, 6 months ago
Can it not be C? what does tilde (~) means in the query? is it legal? Tautology definitely not the answer as it requires "OR" logical clause.
upvoted 2 times
Silascarter
3 years ago
You are right
upvoted 1 times
...
...
Joker20
3 years, 8 months ago
A is correct check https://ktflash.gitbooks.io/ceh_v9/content/132_types_of_sql_injection.html End of Line Comment: After injecting code into a particular field, legitimate code that follows if nullified through usage of end of line comments: SELECT * FROM user WHERE name = 'x' AND userid IS NULL; --';
upvoted 2 times
...
tinex
3 years, 9 months ago
Tautology: Injecting statements that are always true so that queries always return results upon evaluation of a WHERE condition. The answer is Error Based SQL Injection: Tautology . The reason is given below: -Attackers intentionally insert bad input into an application, causing it to throw database errors. -The attacker reads the database-level error messages that result in order to find an SQL injection vulnerability in the application. -Based on this, the attacker then injects SQL queries that are specifically designed to compromise the data security of the application.
upvoted 1 times
...
devag
4 years ago
i meant to say A is correct :)
upvoted 2 times
...
mightyfei
4 years ago
End of Line Comment: After injecting code into a particular field, legitimate code that follows if nullified through usage of end of line comments: SELECT * FROM user WHERE name = 'x' AND userid IS NULL; --'; Comments in a line of code are often denoted by (--), are ignored by the query. The database will execute the code until it reaches the commented portion, after which it will ignore the rest of the query. SELECT * FROM members WHERE username = 'admin'--' AND password = 'password' Tautology: Injecting statements that are always true so that queries always return results upon evaluation of a WHERE condition: SELECT * FROM users WHERE name = '' OR '1'='1'; use a conditional OR clause It can be used to bypass user authentication. answer:A
upvoted 1 times
...
devag
4 years ago
D is correct
upvoted 1 times
...
Rofhza
4 years, 3 months ago
End of Line Comment: After injecting code into a particular field, legitimate code that follows if nullified through usage of e nd of line comments: SELECT * FROM user WHERE name = 'x' AND userid IS NULL; --';
upvoted 3 times
...
TrendMicroDLPSSucks
4 years, 4 months ago
A Search from the CEH hand book modue15 you can see that A is correct
upvoted 4 times
...
Diegoctes
4 years, 5 months ago
The answer is D
upvoted 3 times
...
Keith20002
4 years, 5 months ago
If an attacker uses the command SELECT*FROM user WHERE name = "˜x' AND userid IS NULL; --"˜; which type of SQL injection attack is the attacker performing? A. End of Line Comment B. UNION SQL Injection C. Illegal/Logically Incorrect Query D. Tautology Your answer is presently "Wrong" please fix - should be D. Tautology
upvoted 2 times
datastream
4 years, 4 months ago
Sorry bro but you're wrong. A is the correct answer as per the official documentation. I quote..... Tautology Attackers inject statements that are always true so that queries always return results upon evaluation of a WHERE condition SELECT * FROM users WHERE name = ‘’ OR ‘1’=‘1'; End of Line Comment After injecting code into a particular field, legitimate code that follows is nullified through the use of end of line comments SELECT * FROM user WHERE name = 'x' AND userid IS NULL; --';
upvoted 10 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...