Exam AZ-500 All QuestionsBrowse all questions from this exam
Question 19

You have been tasked with enabling Advanced Threat Protection for an Azure SQL Database server.

Advanced Threat Protection must be configured to identify all types of threat detection.

Which of the following will happen if when a faulty SQL statement is generate in the database by an application?

    Correct Answer: B

    When an application generates a faulty SQL statement in the database, it is typically an indication of a possible vulnerability to SQL injection attacks. This can happen if there is a defect in the application code that constructed the SQL statement or if the application code or stored procedures failed to properly sanitize user input. In such cases, an alert would be generated to signal a vulnerability to SQL injection, rather than an actual SQL injection attempt itself.

Discussion
RumeOption: B

A possible vulnerability to SQL Injection (SQL.VM_VulnerabilityToSqlInjection SQL.DB_VulnerabilityToSqlInjection SQL.MI_VulnerabilityToSqlInjection SQL.DW_VulnerabilityToSqlInjection) An application has generated a faulty SQL statement in the database. This can indicate a possible vulnerability to SQL injection attacks. There are two possible reasons for a faulty statement. A defect in application code might have constructed the faulty SQL statement. Or, application code or stored procedures didn't sanitize user input when constructing the faulty SQL statement, which can be exploited for SQL injection. ) https://docs.microsoft.com/en-us/azure/security-center/alerts-reference#alerts-sql-db-and-warehouse

MeisAdriano

I agree: possibile

NarenderSinghOption: B

correct

AbdallaAMOption: B

AZ 500 Book: When you enable ADS, threat protection is available for SQL. Threat protection for Azure SQL Database detects anomalous activities that indicate unusual and potentially harmful attempts to access or exploit databases. For example, an alert that may be generated by this feature is the possible vulnerability to SQL Injection. This alert might indicate a possible vulnerability to SQL injection attacks. Usually there are two possible reasons for a faulty statement: a defect in application code might have constructed the faulty SQL statement, or the application code/stored procedures didn’t sanitize user input.

DrummerOption: A

A Potential SQL injection alert is triggered. This alert is specifically mentioned as being triggered when an application generates a faulty SQL statement in the database. Advanced Threat Protection can identify potential SQL injection attempts and trigger security alerts upon detection of anomalous database activities. This option is the most appropriate because Advanced Threat Protection is designed to detect various types of threats, including SQL injection attacks. When a potentially harmful SQL statement is detected, it would likely trigger a SQL injection alert as it represents a potential vulnerability that could be exploited by attackers. https://learn.microsoft.com/en-us/azure/azure-sql/database/threat-detection-configure?view=azuresql https://learn.microsoft.com/en-us/azure/azure-sql/database/threat-detection-overview?view=azuresql

PambanOption: A

Potential SQL injection attacks - including vulnerabilities detected when applications generate a faulty SQL statement in the database https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-sql-introduction

Mazhar1993Option: B

The correct option is A Vulnerability to SQL injection alert is triggered: This aligns with the scenario where a faulty SQL statement suggests a possible vulnerability to SQL injection attacks due to improper user input sanitization. A Potential SQL injection alert is not triggered because the context describes a faulty SQL statement generated by an application, indicating a vulnerability rather than an actual SQL injection attempt. An Access from a potentially harmful application alert is not triggered as the context focuses on detecting vulnerabilities related to SQL injection rather than the origin or access pattern of the application. A Brute force SQL credentials alert is not triggered since the context does not indicate any brute force attack or credential-based intrusion attempt. https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-reference#alerts-sql-db-and-warehouse

Jimmy500

It seems you were trying to say B? A possible vulnerability to SQL Injection (SQL.DB_VulnerabilityToSqlInjection SQL.VM_VulnerabilityToSqlInjection SQL.MI_VulnerabilityToSqlInjection SQL.DW_VulnerabilityToSqlInjection Synapse.SQLPool_VulnerabilityToSqlInjection) Description: An application has generated a faulty SQL statement in the database. This can indicate a possible vulnerability to SQL injection attacks. There are two possible reasons for a faulty statement. A defect in application code might have constructed the faulty SQL statement. Or, application code or stored procedures didn't sanitize user input when constructing the faulty SQL statement, which can be exploited for SQL injection.

aks_examOption: A

The answer is A. "A defect in application code might have constructed the faulty SQL statement. Or, application code or stored procedures didn't sanitize user input when constructing the faulty SQL statement, which can be exploited for SQL injection." https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-reference#alerts-sql-db-and-warehouse

yonieOption: B

Answer is B: A possible vulnerability to SQL Injection Alerts for SQL Database https://learn.microsoft.com/en-us/azure/defender-for-cloud/alerts-reference#alerts-sql-db-and-warehouse

MeisAdrianoOption: A

A. A Potential SQL injection alert is triggered. Most Voted A possible vulnerability to SQL Injection https://docs.microsoft.com/en-us/azure/security-center/alerts-reference#alerts-sql-db-and-warehouse

xRiot007Option: B

B - The first thing that usually happens is a vulnerability to SQL injection alert (which is Medium) is created. A faulty SQL statement can also be due to bad application code, not just an actual injection attempt. A - this answer is not correct because this alert is when an attacker is confirmed to attempt to exploit an SQL vulnerability to inject. In this case, the attacker might already have injected malicious code. This is a High severity Pre attack The next thing that would happen, but is not stated here is Execution of an unusual payload with obfuscated parts by the server - this is when the code code through and has been executed by the SQL compromising the data.

orionduoOption: B

A possible vulnerability to SQL Injection (SQL.DB_VulnerabilityToSqlInjection SQL.VM_VulnerabilityToSqlInjection SQL.MI_VulnerabilityToSqlInjection SQL.DW_VulnerabilityToSqlInjection Synapse.SQLPool_VulnerabilityToSqlInjection) Description: An application has generated a faulty SQL statement in the database. This can indicate a possible vulnerability to SQL injection attacks. There are two possible reasons for a faulty statement. A defect in application code might have constructed the faulty SQL statement. Or, application code or stored procedures didn't sanitize user input when constructing the faulty SQL statement, which can be exploited for SQL injection.

MathiasCOption: A

possible = potential

wardy1983Option: B

Answer: B Explanation: vulnerability to SQL Injection (SQL.VM_VulnerabilityToSqlInjection SQL.DB_VulnerabilityToSqlInjection SQL.MI_VulnerabilityToSqlInjection SQL.DW_VulnerabilityToSqlInjection) An application has generated a faulty SQL statement in the database. This can indicate a possible vulnerability to SQL injection attacks. There are two possible reasons for a faulty statement. A defect in application code might have constructed the faulty SQL statement. Or, application code or stored procedures didn't sanitize user input when constructing the faulty SQL statement, which can be exploited for SQL injection. ) Reference: https://docs.microsoft.com/en-us/azure/sql-database/sql-database-threat-detection-overview

BigShot0Option: A

Image #2 in this article lists the description as "Potential SQL Injection" https://learn.microsoft.com/en-us/azure/azure-sql/database/threat-detection-overview?view=azuresql

BonesurferOption: A

1. Potential is a technical synonym for possible 2. B states "A vulnerability for SQL Injection" and not "A possible Vulnerability SQL Injection" That's the difference. I was able to verify it in my Labs, Conclusion = A

killbotsOption: B

Agree with B

ESAJRROption: B

B. A Vulnerability to SQL injection alert is triggered.