Exam CISM All QuestionsBrowse all questions from this exam
Question 952

Which of the following is the BEST way to contain an SQL injection attack that has been detected by a web application firewall?

    Correct Answer: B

    The best way to contain an SQL injection attack detected by a web application firewall is to reconfigure the firewall to block the attack. This approach directly prevents the harmful SQL queries from reaching the database by transitioning the firewall from a detection mode to a prevention mode, effectively stopping the attack at its source. Blocking IPs can be inefficient and updating detection patterns is not an immediate containment strategy. Therefore, immediate action to prevent the attack is to modify the firewall's settings to block such activities.

Discussion
kimsssterOption: B

If Waf was able to detect, it is easy to switch into prevent. Blockin IP is very inefficient solution in case of L7 attacks.

CISSPSTOption: D

The WAF detected the SQL injection attack but was obviously unable to prevent it. Therefore, best course of action to contain the attack would be to block all IP addresses from where the attack originates.

kimssster

Why? If Waf was able to detect, it is easy to switch into prevent. Blockin IP is very inefficient solution in case of L7 attacks.

1899f17Option: D

D. Block the IPs from where the attack originates.

Marcelus1714Option: B

It says the best way to "contain" the attack when the firewall is only "detecting" the sql injection, simply put it on block mode...

AlexJacobsonOption: B

Pentester here - it's B. WAF can be configured to either be IDS or IPS (broadly speaking). So since WAF already detected it, you can simply flip a switch and put it in prevention mode and you're done.

TamerBeSafeOption: C

C. Update the detection patterns on the web application firewall. By updating the detection patterns on the web application firewall, you can enhance its ability to recognize and block the specific patterns associated with the SQL injection attack. This proactive measure allows the WAF to better identify and prevent similar attack patterns in the future, providing a more robust defense against SQL injection attacks. While options like blocking the IPs (Option D) or reconfiguring the web application firewall to block the attack (Option B) can be part of the response strategy, updating the detection patterns is a more precise and focused approach to mitigating the specific type of attack. It allows for a targeted response without disrupting legitimate traffic.

koala_layOption: C

Blocking the IPs from where the attack originates, can be useful if the attack is coming from a specific set of IP addresses. However, it may not be effective if the attackers are using multiple IP addresses or if they are using techniques such as IP spoofing. Updating the detection patterns on the web application firewall (option C) is often the best approach because it allows the firewall to better identify and block SQL injection attacks. By updating the detection patterns, the firewall can recognize the specific patterns or signatures associated with SQL injection attacks and take appropriate action to block or mitigate them. This approach is generally more flexible and adaptable to new attack techniques compared to simply blocking IP addresses or reconfiguring the firewall.

richck102Option: D

D. Block the IPs from where the attack originates.

koala_layOption: C

Out of the options provided, the BEST way to contain an SQL injection attack that has been detected by a web application firewall is option C: Update the detection patterns on the web application firewall. SQL injection attacks can exploit vulnerabilities in web applications to execute malicious SQL queries on the underlying database. When a web application firewall (WAF) detects an SQL injection attack, it is important to take appropriate measures to contain and mitigate the attack. In summary, updating the detection patterns on the web application firewall is the best way to contain an SQL injection attack that has been detected. It enhances the WAF's ability to identify and block the attack, providing immediate containment and reducing the risk of further exploitation.

AlexJacobson

WTF? Do you even read what chatgpt spews out before you paste it here. Dude, the question literally says that WAF detected the attack, so why would you update the signatures???