exam questions

Exam CISM All Questions

View all questions & answers for the CISM exam

Exam CISM topic 1 question 952 discussion

Actual exam question from Isaca's CISM
Question #: 952
Topic #: 1
[All CISM Questions]

Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?

  • A. Force password changes on the SQL database.
  • B. Reconfigure the web application firewall to block the attack.
  • C. Update the detection patterns on the web application firewall.
  • D. Block the IPs from where the attack originates.
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
1899f17
1 month, 2 weeks ago
D. Block the IPs from where the attack originates.
upvoted 1 times
...
Marcelus1714
4 months, 3 weeks ago
Selected Answer: B
It says the best way to "contain" the attack when the firewall is only "detecting" the sql injection, simply put it on block mode...
upvoted 2 times
...
AlexJacobson
5 months, 2 weeks ago
Selected Answer: B
Pentester here - it's B. WAF can be configured to either be IDS or IPS (broadly speaking). So since WAF already detected it, you can simply flip a switch and put it in prevention mode and you're done.
upvoted 2 times
...
TamerBeSafe
5 months, 3 weeks ago
Selected Answer: C
C. Update the detection patterns on the web application firewall. By updating the detection patterns on the web application firewall, you can enhance its ability to recognize and block the specific patterns associated with the SQL injection attack. This proactive measure allows the WAF to better identify and prevent similar attack patterns in the future, providing a more robust defense against SQL injection attacks. While options like blocking the IPs (Option D) or reconfiguring the web application firewall to block the attack (Option B) can be part of the response strategy, updating the detection patterns is a more precise and focused approach to mitigating the specific type of attack. It allows for a targeted response without disrupting legitimate traffic.
upvoted 1 times
...
kimssster
6 months, 1 week ago
Selected Answer: B
If Waf was able to detect, it is easy to switch into prevent. Blockin IP is very inefficient solution in case of L7 attacks.
upvoted 3 times
...
koala_lay
8 months, 3 weeks ago
Blocking the IPs from where the attack originates, can be useful if the attack is coming from a specific set of IP addresses. However, it may not be effective if the attackers are using multiple IP addresses or if they are using techniques such as IP spoofing. Updating the detection patterns on the web application firewall (option C) is often the best approach because it allows the firewall to better identify and block SQL injection attacks. By updating the detection patterns, the firewall can recognize the specific patterns or signatures associated with SQL injection attacks and take appropriate action to block or mitigate them. This approach is generally more flexible and adaptable to new attack techniques compared to simply blocking IP addresses or reconfiguring the firewall.
upvoted 1 times
...
richck102
8 months, 3 weeks ago
Selected Answer: D
D. Block the IPs from where the attack originates.
upvoted 1 times
...
koala_lay
9 months ago
Selected Answer: C
Out of the options provided, the BEST way to contain an SQL injection attack that has been detected by a web application firewall is option C: Update the detection patterns on the web application firewall. SQL injection attacks can exploit vulnerabilities in web applications to execute malicious SQL queries on the underlying database. When a web application firewall (WAF) detects an SQL injection attack, it is important to take appropriate measures to contain and mitigate the attack. In summary, updating the detection patterns on the web application firewall is the best way to contain an SQL injection attack that has been detected. It enhances the WAF's ability to identify and block the attack, providing immediate containment and reducing the risk of further exploitation.
upvoted 1 times
AlexJacobson
5 months, 2 weeks ago
WTF? Do you even read what chatgpt spews out before you paste it here. Dude, the question literally says that WAF detected the attack, so why would you update the signatures???
upvoted 1 times
...
...
CISSPST
9 months, 3 weeks ago
Selected Answer: D
The WAF detected the SQL injection attack but was obviously unable to prevent it. Therefore, best course of action to contain the attack would be to block all IP addresses from where the attack originates.
upvoted 2 times
kimssster
6 months, 1 week ago
Why? If Waf was able to detect, it is easy to switch into prevent. Blockin IP is very inefficient solution in case of L7 attacks.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago