exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 22 discussion

Actual exam question from CompTIA's CAS-004
Question #: 22
Topic #: 1
[All CAS-004 Questions]

A security analyst discovered that the company's WAF was not properly configured. The main web server was breached, and the following payload was found in one of the malicious requests:

Which of the following would BEST mitigate this vulnerability?

  • A. CAPTCHA
  • B. Input validation
  • C. Data encoding
  • D. Network intrusion prevention
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
lordguck
Highly Voted 2 years, 5 months ago
B: seems right An XML External Entity attack is a type of attack against an application that parses XML input. This attack occurs when XML input containing a reference to an external entity is processed by a weakly configured XML parser. This attack may lead to the disclosure of confidential data, denial of service, server side request forgery, port scanning from the perspective of the machine where the parser is located, and other system impacts.
upvoted 7 times
...
blacksheep6r
Most Recent 2 months, 2 weeks ago
Selected Answer: B
Best Mitigation: ✅ B) Input Validation ✔ Why? Input validation ensures user-supplied data is properly sanitized before being processed. It prevents attackers from injecting malicious XML payloads that reference external files. Secure XML parsers disable external entity processing, which stops XXE attacks.
upvoted 1 times
...
23169fd
9 months, 2 weeks ago
Selected Answer: B
Understanding XXE: The payload provided (<!DOCTYPE doc [ <!ELEMENT doc ANY> <!ENTITY xxe SYSTEM "file:///etc/passwd" > ]><doc>&xxe;</doc>) is designed to exploit an XXE vulnerability by attempting to access the /etc/passwd file. XXE attacks exploit vulnerabilities in XML parsers. Input Validation: Properly validating and sanitizing input data, especially XML content, ensures that harmful payloads are not processed by the application. This includes disabling DTD (Document Type Definition) processing if it's not needed.
upvoted 1 times
...
Delab202
1 year, 3 months ago
Selected Answer: B
The payload provided in the question indicates an XML External Entity (XXE) injection vulnerability. To mitigate this vulnerability, the BEST option is: B. Input validation
upvoted 1 times
...
BiteSize
1 year, 9 months ago
Selected Answer: B
WAF is allowing the "input shown" to come through. Input validation keeps payloads out. CAPTCHA is for bots Data encoding would hide the payload. Network intrusion prevention - An excellent option for when a threat actor gets past the WAF, but it's not the BEST for this scenario. Stop the Bleed first, and close the input validation security problem. Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)
upvoted 3 times
...
margomi86
2 years, 1 month ago
Selected Answer: B
The payload in the malicious request indicates the presence of an XML External Entity (XXE) injection vulnerability. This type of vulnerability allows an attacker to read files on the affected system and execute arbitrary code. To mitigate this vulnerability, the company should implement input validation to sanitize user input and prevent the injection of malicious payloads like the one found in the breach. Therefore, the best option is: B. Input validation
upvoted 3 times
...
Geofab
2 years, 1 month ago
Selected Answer: B
To prevent malicious input from being included in XML documents, validate, and sanitize all user input before including it in an XML document. https://www.indusface.com/blog/how-to-identify-and-mitigate-xxe-vulnerability/
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago