hardmultiple choiceObjective-mapped

A Java web service accepts a Base64-encoded `profile` object from the browser. During testing, changing a serialized field from `role=user` to `role=admin` causes a deserialization error unless the original signed blob is reused. When a captured valid blob is modified only slightly, the application reconstructs a different class and then exposes an internal admin page. Which attack pattern is most likely?

Question 1hardmultiple choice
Full question →

A Java web service accepts a Base64-encoded `profile` object from the browser. During testing, changing a serialized field from `role=user` to `role=admin` causes a deserialization error unless the original signed blob is reused. When a captured valid blob is modified only slightly, the application reconstructs a different class and then exposes an internal admin page. Which attack pattern is most likely?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Insecure deserialization, because untrusted serialized data is being reconstructed into server-side objects.

Insecure deserialization is the best fit because the application accepts a serialized object from an untrusted source and turns it back into live server-side data. The fact that a small modification changes object behavior shows the server is trusting attacker-controlled serialized content. That can lead to authorization bypass, object confusion, or even code execution depending on the framework and validation controls.

B

Distractor review

SQL injection, because the attacker is changing a field to access a different page.

SQL injection involves manipulating a database query, usually through crafted input that changes SQL logic. This scenario never shows a database query or SQL syntax.

C

Distractor review

Cross-site request forgery, because the browser is sending a forged request to the application.

CSRF abuses an authenticated browser session to submit an unwanted request. Here, the core issue is reconstructing attacker-influenced serialized objects, not tricking a browser into making a state-changing request.

D

Distractor review

Cross-site scripting, because the modified object exposes an internal admin page.

XSS executes attacker-controlled script in the victim's browser. The problem here happens during server-side object reconstruction, before any browser script execution would matter.

Common exam trap

Common exam trap: authentication is not authorization

Logging in proves the user can authenticate. It does not automatically mean the user is allowed to enter privileged or configuration mode. Watch for AAA authorization, privilege level and command authorization details.

Technical deep dive

How to think about this question

This kind of question is testing the difference between identity and permission. A user may successfully log in to a router because authentication is working, but still fail to enter configuration mode because authorization is missing, misconfigured or mapped to a lower privilege level.

KKey Concepts to Remember

  • Authentication checks who the user is.
  • Authorization controls what the user is allowed to do after login.
  • Privilege levels affect access to EXEC and configuration commands.
  • AAA, TACACS+ and RADIUS can separate login success from command access.

TExam Day Tips

  • Do not assume successful login means full administrative access.
  • Look for words such as cannot enter configuration mode, privilege level, authorization or command access.
  • Separate login problems from permission problems before choosing the answer.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Authentication checks who the user is.

What is the correct answer to this question?

The correct answer is: Insecure deserialization, because untrusted serialized data is being reconstructed into server-side objects. — Insecure deserialization is the correct pattern because the application is trusting serialized data supplied by the client. When that data is modified and then reconstructed into a different class or state, the server may perform unintended actions or bypass authorization. This is especially risky in Java applications where object graphs and signed blobs can be mishandled. The internal admin page exposure is a downstream effect of unsafe object handling. Why others are wrong: SQL injection is wrong because there is no database query manipulation in the scenario. CSRF is about unintended browser actions, not object reconstruction. XSS targets the browser runtime, while this issue occurs on the server when it deserializes attacker-influenced data into application objects.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.