exam questions

Exam 200-201 All Questions

View all questions & answers for the 200-201 exam

Exam 200-201 topic 1 question 156 discussion

Actual exam question from Cisco's 200-201
Question #: 156
Topic #: 1
[All 200-201 Questions]


Refer to the exhibit. What is occurring?

  • A. insecure deserialization
  • B. cross-site scripting attack
  • C. XML External Entities attack
  • D. regular GET requests
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
fjcsanchez
Highly Voted 1 year, 9 months ago
Correct is B https://security.tcnj.edu/resources-tips/resources-for-server-administrators-and-developers/detecting-cross-site-scripting-attacks/ “GET /%27%27;!–%22%3CXSS%3E=&{() } HTTP/1.1″
upvoted 7 times
cy_analyst
1 year, 8 months ago
Thanks for sharing the part to look for is --> GET /%27%27 and some more variants of that.
upvoted 3 times
...
...
RoBery
Most Recent 5 months, 3 weeks ago
B / followed by URL-encoded characters: %27 represents a single quote ('), %22 represents a double quote ("), and %3C and %3E represent the less-than (<) and greater-than (>) symbols, respectively. These characters are being URL-encoded. ;!--: This might be an attempt to include a comment in the payload. %22%3CXSS%3E=: This part might be trying to inject an XSS payload. &{()}: This could be part of the payload, potentially attempting to inject additional characters or execute certain actions.
upvoted 1 times
...
CCNPTT
7 months, 3 weeks ago
Selected Answer: B
Special Characters: %27: ' %22: " %3C: < %3E: > Is an XSS attack, it's trying to get something like /'';!-"<XSS>=&{()}
upvoted 3 times
...
MartinRB
1 year, 4 months ago
Selected Answer: B
Here is one sample web access log entry that is a sign of an XSS attack. 192.168.0.252 – – [05/Aug/2009:15:16:42 -0400] “GET /%27%27;!–%22%3CXSS%3E=&{() } HTTP/1.1″ 404 310 “-” “Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.0.12) Gecko/2009070812 Ubuntu/8.04 (hardy) Firefox/3.0.12″ The part to look for is the GET /%27%27 command (there are several variants).
upvoted 3 times
...
cy_analyst
1 year, 8 months ago
Selected Answer: B
B because of --> GET /%27%27
upvoted 1 times
...
Eng_ahmedyoussef
1 year, 9 months ago
i think that it is C. XML External Entities attack
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago