ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 240 - CS0-003 discussion

Report
Export

A penetration tester submitted data to a form in a web application, which enabled the penetration tester to retrieve user credentials. Which of the following should be recommended for remediation of this application vulnerability?

A.
Implementing multifactor authentication on the server OS
Answers
A.
Implementing multifactor authentication on the server OS
B.
Hashing user passwords on the web application
Answers
B.
Hashing user passwords on the web application
C.
Performing input validation before allowing submission
Answers
C.
Performing input validation before allowing submission
D.
Segmenting the network between the users and the web server
Answers
D.
Segmenting the network between the users and the web server
Suggested answer: C

Explanation:

Performing input validation before allowing submission is the best recommendation for remediation of this application vulnerability. Input validation is a technique that checks the data entered by users or attackers against a set of rules or constraints, such as data type, length, format, or range. Input validation can prevent common web application attacks such as SQL injection, cross-site scripting (XSS), or command injection, which exploit the lack of input validation to execute malicious code or commands on the server or the client side. By validating the input before allowing submission, the web application can reject or sanitize any malicious or unexpected input, and protect the user credentials and other sensitive data from being compromised12.

Reference: Input Validation - OWASP, 4 Most Common Application Vulnerabilities and Possible Remediation

asked 02/10/2024
Beatriz Mejia
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first