Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 397 discussion

Actual exam question from ISC's CISSP
Question #: 397
Topic #: 1
[All CISSP Questions]

Which of the following methods is MOST effective in mitigating Cross-Site Scripting (XSS) vulnerabilities within HyperText Markup Language (HTML) websites?

  • A. Use antivirus and endpoint protection on the server to secure the web-based application
  • B. Place the web-based system in a defined Demilitarized Zone (DMZ)
  • C. Use .NET framework with .aspx extension to provide a higher level of security to the web application so that the web server display can be locked down
  • D. Not returning any HTML tags to the browser client
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
1460168
3 months, 3 weeks ago
Selected Answer: D
Only D makes sense, because you need the ability to set html tags to run scripts.
upvoted 1 times
...
gjimenezf
9 months, 3 weeks ago
Selected Answer: D
XSS is a vulnerability that exploits the web browser of the user when it loads some malicious code returned from HTML tags to the web browser
upvoted 1 times
...
YesPlease
11 months ago
Selected Answer: D
Answer D) https://www.verizon.com/business/resources/articles/s/how-to-mitigate-cross-site-scripting/#:~:text=Whenever%20possible%2C%20prohibit%20HTML%20code%20in%20inputs.%20Preventing%20users%20from%20posting%20HTML%20code%20into%20form%20inputs%20is%20a%20straightforward%20and%20effective%20measure.
upvoted 1 times
...
Soleandheel
11 months, 1 week ago
D. Not returning any HTML tags to the browser client. Cross-Site Scripting (XSS) vulnerabilities occur when untrusted data is included in a web page and executed as code in a user's browser. By not returning any HTML tags to the browser client, you are effectively preventing any malicious code injection into the page. This approach, known as output encoding or input validation, helps ensure that user input is treated as plain text and not as executable code. It's a fundamental security practice to prevent XSS attacks.
upvoted 2 times
...
InclusiveSTEAM
1 year, 1 month ago
The suggested answer D is correct The most effective method for mitigating Cross-Site Scripting (XSS) vulnerabilities within HTML websites is option D - not returning any HTML tags to the browser client. XSS exploits allow attackers to inject malicious client-side scripts. By not returning any HTML tags at all, you completely prevent the ability for attackers to inject active content that could execute scripts. This stops XSS at the root. Antivirus (A) cannot catch all XSS payloads. DMZs (B) only limit network access, not code injection. .NET (C) helps but does not inherently prevent all XSS like removing HTML tags does. By configuring the application to return no HTML tags, you guarantee malicious scripts have no entry point, shutting down potential XSS vectors altogether. This direct, foolproof approach makes it the most effective mitigation.
upvoted 3 times
...
Voxycs
1 year, 1 month ago
Here we go again...mass confusion. I'd go with D. FML
upvoted 4 times
...
HughJassole
1 year, 5 months ago
B. At work all web servers are in a DMZ, and this makes sense because the DMZ is separated from the rest of the infrastructure. The question talks about mitigation, even if someone runs a script since it's in the DMZ it won't go anywhere.
upvoted 1 times
...
Tygrond87
1 year, 6 months ago
Selected Answer: C
I think D would make your website non functional so go with C ?
upvoted 1 times
jackdryan
1 year, 6 months ago
A is correct
upvoted 1 times
...
...
Delab202
1 year, 7 months ago
Selected Answer: A
For the administrator of a website, defenses against XSS include maintaining a patched web server, using web application firewalls, operating a host-based intrusion detection system (HIDS), auditing for suspicious activity, and, most important, performing server-side input validation for length, malicious content, and metacharacter filtering. As a web user, you can defend against XSS by keeping your system patched, running antivirus software, and avoiding nonmainstream websites. There are add-ons for some web browsers, such as NoScript for Firefox and uBlock Origin for Chrome, that allow only scripts of your choosing to be executed.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...