exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 313 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 313
Topic #: 1
[All 312-50v11 Questions]

Ron, a security professional, was pen testing web applications and SaaS platforms used by his company. While testing, he found a vulnerability that allows hackers to gain unauthorized access to API objects and perform actions such as view, update, and delete sensitive data of the company.
What is the API vulnerability revealed in the above scenario?

  • A. No ABAC validation
  • B. Business logic flaws
  • C. Improper use of CORS
  • D. Code injections
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Sam_Fyl
Highly Voted 1 year, 6 months ago
A is likely the answer. A- No proper attribute-based access control (ABAC) validation allows attackers to gain unauthorized access to API objects or perform actions such as viewing, updating, or deleting.
upvoted 18 times
lawbut2
1 year, 5 months ago
Concur. It's on page 1910.
upvoted 9 times
...
...
foicram
Highly Voted 1 year, 2 months ago
A: No ABAC Validation - No ABAC Validation - No proper attribute-based access control (ABAC) validation allows attackers to gain unauthorized access to API objects or perform actions such as viewing, updating, or deleting. - Business Logic Flaws - Many APIs come with vulnerabilities in business logic . Allow attackers to exploit legitimate workflows for malicious purposes. - Improper Use of CORS - Cross-origin resource sharing (CORS) is a mechanism that enables the web browser to perform cross-domain requests; improper implementations of CORS can cause unintentional flaws . Using the “Access-Control-Allow-Origin” header for allowing all origins on private APIs can lead to hotlinking. - Code Injections - If the input is not sanitized, attackers may use code injection techniques such as SQLi and XSS to add malicious SQL statements or code to the input fields on the API. Allow attackers to steal critical information such as session cookies and user credentials.
upvoted 10 times
...
Daniel8660
Most Recent 6 months, 2 weeks ago
Selected Answer: A
API Vulnerabilities 7. No ABAC Validation - No proper attribute-based access control (ABAC) validation allows attackers to gain unauthorized access to API objects or perform actions such as viewing, updating, or deleting. (P.1927/1911)
upvoted 5 times
...
volatile
10 months ago
Selected Answer: A
- No ABAC Validation - No proper attribute-based access control (ABAC) validation allows attackers to gain unauthorized access to API objects or perform actions such as viewing, updating, or deleting.
upvoted 1 times
...
Tasadar92
1 year ago
Selected Answer: A
- No ABAC Validation - No proper attribute-based access control (ABAC) validation allows attackers to gain unauthorized access to API objects or perform actions such as viewing, updating, or deleting.
upvoted 1 times
...
Qudaz
1 year, 2 months ago
Selected Answer: A
Answer is A, no ABAC validation.
upvoted 1 times
...
egz21
1 year, 3 months ago
Selected Answer: A
A: No ABAC Validation
upvoted 2 times
...
Silascarter
1 year, 5 months ago
Ron, a security professional, was pen testing web applications and SaaS platforms used by his company. While testing, he found a vulnerability that allows hackers to gain unauthorized access to API objects and perform actions such as view, update, and delete sensitive data of the company. A is Correct.
upvoted 2 times
...
alissonloyola
1 year, 5 months ago
A - Lack of proper ABAC validation allows attackers to gain unauthorized access to API objects or actions to perform viewing, updating, or deleting Module 14 Page 1910
upvoted 4 times
...
brdweek
1 year, 5 months ago
A: No ABAC Validation unauthorized access to API objects and perform actions such as view, update, and delete sensitive data of the company.
upvoted 3 times
...
Q0ne
1 year, 7 months ago
I prefer to C. Cuz the question is 'API vulnerability', rather than 'Potential issues'.
upvoted 1 times
...
holasya
1 year, 7 months ago
It's A
upvoted 2 times
...
Clauu
1 year, 7 months ago
correct answer is No ABAC validation
upvoted 2 times
...
Scryptic
1 year, 7 months ago
Because CORS is an access control mechanism, it can be misconfigured, thereby enabling an attacker to bypass it and make the client browser act as a proxy between a malicious website and the target web application. ... Building dynamic Access-Control-Allow-Origin with improper server-side validation
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago