Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CCSP All Questions

View all questions & answers for the CCSP exam

Exam CCSP topic 1 question 266 discussion

Actual exam question from ISC's CCSP
Question #: 266
Topic #: 1
[All CCSP Questions]

Which of the following threat types involves leveraging a user's browser to send untrusted data to be executed with legitimate access via the user's valid credentials?

  • A. Injection
  • B. Missing function-level access control
  • C. Cross-site scripting
  • D. Cross-site request forgery
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
ArizonaClassics
Highly Voted 4 years, 10 months ago
THE CORRECT ANSWER IS CRF!! Cross-site Request Forgery (CSRF) is a type of confused deputy attack, which leverages the authentication and authorization of the victim when a forged request is being sent to the web server. Therefore, a CSRF vulnerability that affects highly privileged users, such as administrators, could result in a full application compromise. During a successful CSRF attack, the victim’s web browser is tricked by a malicious website into unwanted action – it sends HTTP requests to the web application as intended by the attacker. Normally, such a request would involve submitting forms present on the web application to alter some data. https://www.acunetix.com/blog/articles/cross-site-request-forgery/
upvoted 18 times
...
muyenzo
Highly Voted 4 years, 11 months ago
The answer should be Cross-site scripting not CSRF.
upvoted 14 times
...
Lee_Lah
Most Recent 9 months, 1 week ago
Selected Answer: D
D - CSRF
upvoted 1 times
...
Pika26
1 year, 6 months ago
Selected Answer: C
C: Cross-site scripting (XSS)
upvoted 3 times
...
nelombg
1 year, 7 months ago
Answer is C.
upvoted 2 times
...
gbabes
1 year, 9 months ago
https://books.google.com/books?id=WHLWDwAAQBAJ&pg=PT28&lpg=PT28&dq=Which+of+the+following+threat+types+involves+leveraging+a+user%27s+browser+to+send+untrusted+data+to+be+executed+with+legitimate+access+via+the+user%27s+valid+credentials?&source=bl&ots=Y5ROsIMP2W&sig=ACfU3U3tpq5jrwP9FYzCixYUpJK_mMESwA&hl=en&sa=X&ved=2ahUKEwibnpXm8ff8AhWNkIkEHWwmDqgQ6AF6BAgfEAM#v=onepage&q&f=false states the exact explanation Answer D - CSRF
upvoted 1 times
gbabes
1 year, 9 months ago
Sorry - now I think my above reference is incorrect - I believe it is Cross-site scripting (Answer C)
upvoted 1 times
...
...
AJ2021
2 years ago
Selected Answer: D
D is correct because with XSS you don't need to go through validation. Read the question carefully !!
upvoted 2 times
...
kepalon
2 years, 8 months ago
Selected Answer: C
D is wrong. XSS is the right answer so B.
upvoted 2 times
...
BigMomma4752
2 years, 10 months ago
The correct answer is C.
upvoted 2 times
...
Irivera
3 years, 10 months ago
answer is XSS not CSRF CSRF will try to run using commands in the web application XSS will execute on the user desktop
upvoted 4 times
...
roki
4 years, 1 month ago
explanation is correct and answer is wrong
upvoted 3 times
...
Kanthie
4 years, 1 month ago
Answer - C OWASP 10 - XSS flaws occur whenever an application includes untrusted data in a new web page without proper validation or escaping, or updates an existing web page with user supplied data using a browser API that can create HTML or JavaScript. XSS allows attackers to execute scripts in the victim’s browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites.
upvoted 5 times
...
ichnos
4 years, 1 month ago
Correct Answer: D Cross-Site Request Forgery (CSRF) A CSRF attack forces an authenticated client that a user has open to send forged requests under their own credentials to execute commands and requests that the application thinks are coming from a trusted client and user. Although an attacker cannot use this type of attack to steal data directly, because they have no way to see the results of the commands, it does open up other ways to compromise an application. If the authenticated user has permissions as a regular user of a system, CSRF could be used to execute any portion of the application where they have access.
upvoted 5 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...