Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CCSP All Questions

View all questions & answers for the CCSP exam

Exam CCSP topic 1 question 46 discussion

Actual exam question from ISC's CCSP
Question #: 46
Topic #: 1
[All CCSP Questions]

Which of the following threat types involves the sending of untrusted data to a user's browser to be executed with their own credentials and access?

  • A. Missing function level access control
  • B. Cross-site scripting
  • C. Cross-site request forgery
  • D. Injection
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Fpaul
Highly Voted 3 years, 5 months ago
This is 100% cross site request forgery.... the basic way it works is someone sends you a link to execute commands on a website you are already authenticated with (hence it runs with users credentials being the key)
upvoted 17 times
xroxro
2 years, 3 months ago
see my comment below I thing that "sending of untrusted data to a user's browser" correspond more to a stored XSS than a CSRF In CSRF you do not directly send forged data to the browser
upvoted 6 times
...
...
Zeezee2
Highly Voted 3 years ago
Certainly B. XSS means user loads a site he/she trusts which has an injected script of attacker and that user's browser executes that attacker's script with the authentication of that user because he/she may be logged in to the site at that time. With CSRF, an attacker tricks a user's brower into issuing requests which are first sent by the attacker to the user, and the website executes the attacker's requests. Here, the website trusts the user not the other way around. There is no script from the attacker that is stored on the website in this case. Both attacks relate to lack of authenticating/validating user input.
upvoted 6 times
...
TheFivePips
Most Recent 5 months, 1 week ago
Selected Answer: B
B. Cross-site scripting (XSS): XSS vulnerabilities occur when an application includes untrusted data on a web page without proper validation or escaping, allowing attackers to execute malicious scripts in the user's browser. These scripts run in the context of the user's session, potentially using their credentials and access. C. Cross-site request forgery (CSRF): CSRF attacks involve tricking a user into making unwanted actions on a web application where they are authenticated. It doesn't involve injecting and executing untrusted scripts in the user's browser.
upvoted 2 times
...
8a21350
8 months, 1 week ago
CSRF is an attack that tricks the victim into submitting a malicious request. It inherits the identity and privileges of the victim to perform an undesired function on the victim’s behalf (though note that this is not true of login CSRF, a special form of the attack described below). For most sites, browser requests automatically include any credentials associated with the site, such as the user’s session cookie, IP address, Windows domain credentials, and so forth. Therefore, if the user is currently authenticated to the site, the site will have no way to distinguish between the forged request sent by the victim and a legitimate request sent by the victim. Correct Answer is C
upvoted 1 times
...
cloudenthusiast
8 months, 3 weeks ago
Selected Answer: C
key word is trig the user
upvoted 1 times
TheFivePips
5 months, 1 week ago
thats never used in the question....
upvoted 1 times
...
...
nikhilborle
1 year ago
Selected Answer: C
The answer is C, CSRF. https://owasp.org/www-community/attacks/csrf
upvoted 1 times
...
Squidly888
1 year, 2 months ago
good discussion here. My first thought was XSS but you may have convinced me that it should be CSRF. I hope I don't have that question on my test tomorrow.
upvoted 1 times
...
bu3oof
1 year, 2 months ago
Answer is C (CSRF) . Just have a look on any digram of CSRF, you will notice the hacker will send a users with phishing link where the user will enter his credential.
upvoted 1 times
...
Krishna2637
1 year, 3 months ago
Selected Answer: C
untrusted data is the key, Forgery is the one I pick.
upvoted 1 times
...
nelombg
1 year, 3 months ago
Cross site forgery oils the answer
upvoted 1 times
...
SamDavid
1 year, 3 months ago
Selected Answer: C
CSRF is the coorect answer
upvoted 1 times
...
earlyDev
1 year, 4 months ago
B.Cross-Site Request Forgery (CSRF) is a type of attack that tricks the victim into submitting a malicious request. It infiltrates a victim's browser and then forces it to send an HTTP request to a target site to which the victim is already authenticated. The crucial difference is that with CSRF, the malicious request is sent to the site with the victim's credentials, meaning it's the site that's fooled into thinking the request is legitimate. With Cross-Site Scripting (XSS), malicious scripts are executed in the user's browser, not the server.
upvoted 2 times
...
Joe09
1 year, 5 months ago
Selected Answer: B
B definitaley
upvoted 1 times
...
ikamalbhatt
1 year, 6 months ago
Selected Answer: C
C definitely
upvoted 1 times
...
nachoqueen
2 years ago
Selected Answer: B
B. XSS CSRF attacks require the authenticated user to be in an active session, while the XSS attack does not. In an XSS attack, payloads can be stored and delivered whenever the user logs in.
upvoted 4 times
...
quagga
2 years, 1 month ago
Selected Answer: B
B: XSS
upvoted 2 times
...
serget12
2 years, 1 month ago
Answer is B, XSS Cross-Site Request Forgery (CSRF): A CSRF attack forces a logged-on victim’s browser to send a forged HTTP request, including the victim’s session cookie and any other automatically included authentication information, to a vulnerable web application.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...