Solved

A Security Engineer Successfully Exploits an Application During a Penetration

Question 141

Multiple Choice

A security engineer successfully exploits an application during a penetration test. As proof of the exploit, the security engineer takes screenshots of how data was compromised in the application. Given the information below from the screenshot. A security engineer successfully exploits an application during a penetration test. As proof of the exploit, the security engineer takes screenshots of how data was compromised in the application. Given the information below from the screenshot.   Which of the following tools was MOST likely used to exploit the application? A)  The engineer captured the data with a protocol analyzer, and then utilized Python to edit the data B)  The engineer queried the server and edited the data using an HTTP proxy interceptor C)  The engineer used a cross-site script sent via curl to edit the data D)  The engineer captured the HTTP headers, and then replaced the JSON data with a banner-grabbing tool Which of the following tools was MOST likely used to exploit the application?


A) The engineer captured the data with a protocol analyzer, and then utilized Python to edit the data
B) The engineer queried the server and edited the data using an HTTP proxy interceptor
C) The engineer used a cross-site script sent via curl to edit the data
D) The engineer captured the HTTP headers, and then replaced the JSON data with a banner-grabbing tool

Correct Answer:

verifed

Verified

Unlock this answer now
Get Access to more Verified Answers free of charge

Related Questions

Unlock this Answer For Free Now!

View this answer and more for free by performing one of the following actions

qr-code

Scan the QR code to install the App and get 2 free unlocks

upload documents

Unlock quizzes for free by uploading documents