ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 361 - CS0-003 discussion

Report
Export

An XSS vulnerability was reported on one of the public websites of a company. The security department confirmed the finding and needs to provide a recommendation to the application owner. Which of the following recommendations will best prevent this vulnerability from being exploited? (Select two).

A.

Implement an IPS in front of the web server.

Answers
A.

Implement an IPS in front of the web server.

B.

Enable MFA on the website.

Answers
B.

Enable MFA on the website.

C.

Take the website offline until it is patched.

Answers
C.

Take the website offline until it is patched.

D.

Implement a compensating control in the source code.

Answers
D.

Implement a compensating control in the source code.

E.

Configure TLS v1.3 on the website.

Answers
E.

Configure TLS v1.3 on the website.

F.

Fix the vulnerability using a virtual patch at the WAF.

Answers
F.

Fix the vulnerability using a virtual patch at the WAF.

Suggested answer: D, F

Explanation:

Comprehensive Detailed

To effectively prevent Cross-Site Scripting (XSS) attacks, implementing appropriate security controls within the application code and at the network layer is critical. Here's a breakdown of each option:

A . Implement an IPS in front of the web server

Intrusion Prevention Systems (IPS) are primarily designed to detect and prevent network-based attacks, not application-layer vulnerabilities such as XSS. They do not specifically mitigate XSS threats effectively.

B . Enable MFA on the website

Multi-factor authentication (MFA) strengthens user authentication but does not address XSS, which typically involves injecting malicious scripts rather than compromising user credentials.

C . Take the website offline until it is patched

While this might temporarily mitigate the risk, it is not a practical solution for ongoing operations, especially when effective preventative controls (e.g., WAF rules or code updates) can be implemented without disabling the service.

D . Implement a compensating control in the source code

Implementing security controls at the code level is an effective way to mitigate XSS risks. This can involve proper input validation, output encoding, and utilizing libraries that sanitize user inputs. By addressing the root cause in the source code, developers prevent scripts from being injected or executed in the browser.

E . Configure TLS v1.3 on the website

While TLS v1.3 secures the communication channel, it does not address XSS directly. XSS attacks manipulate client-side scripts, which TLS cannot prevent, as TLS only encrypts data in transit.

F . Fix the vulnerability using a virtual patch at the WAF

Web Application Firewalls (WAFs) can mitigate XSS vulnerabilities by identifying and blocking malicious payloads. Virtual patching at the WAF level provides a temporary fix by preventing exploit attempts from reaching the application, giving developers time to implement a permanent fix in the source code.

OWASP XSS Prevention Cheat Sheet: Detailed guidance on encoding, sanitizing, and safe coding practices to prevent XSS.

NIST SP 800-44: Guidelines on Web Security, discussing WAFs and application-layer protections.

CWE-79: Common Weakness Enumeration on Cross-Site Scripting, which outlines ways to address and prevent XSS attacks.

asked 15/11/2024
nebaba monda
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first