Western Governors University (WGU) ITEC2034 D385 Software Security and Testing Practice Test

Session length

1 / 20

Which statement about code injection attacks is accurate?

They can lead to unauthorized actions or data breaches

Code injection vulnerabilities occur when an application treats user-supplied input as part of a command, query, or script. This can allow an attacker to execute actions the program shouldn’t allow or to read, alter, or exfiltrate data, which is why this statement is accurate. Injection flaws can show up in databases through SQL commands, on servers via OS commands, or in web apps through scripts, making it possible to manipulate data, deface pages, or steal sensitive information. They don’t just affect cosmetic UI elements; the impact is often on data integrity and system behavior across layers. They don’t require physical access to the server—remote input over the network can be enough to exploit them. And they aren’t guaranteed to be prevented by a firewall—firewalls can help in some cases, but the true defense lies in secure coding practices: validating and escaping input, using parameterized queries, enforcing least privilege, and conducting thorough input handling and testing.

They only affect cosmetic UI elements

They require physical access to the server

They are always prevented by a firewall

Next Question
Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy