exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 604 discussion

Actual exam question from CompTIA's SY0-601
Question #: 604
Topic #: 1
[All SY0-601 Questions]

Which of the following examples would be best mitigated by input sanitization?

  • A.
  • B. nmap -p- 10.11.1.130
  • C. Email message: “Click this link to get your free gift card.”
  • D. Browser message: “Your connection is not private.”
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
[Removed]
Highly Voted 1 year, 9 months ago
Am I tweaking? I dont see an answer for A
upvoted 19 times
zits88
1 year, 9 months ago
Glad I'm not the only one. And amazing username. Stealing it.
upvoted 7 times
...
sarah2023
1 year, 9 months ago
Seems like A is XSS by reading the comments, I can't see it either
upvoted 7 times
...
...
Ghost6333525
Highly Voted 1 year, 4 months ago
Selected Answer: A
Which of the following examples would be best mitigated by input sanitization? A. XSS (Correct Answer) B. nmap -p- 10.11.1.130 C. Email message: “Click this link to get your free gift card.” D. Browser message: “Your connection is not private.”
upvoted 8 times
...
spearous
Most Recent 1 year ago
Selected Answer: A
it's A. Actually, the fact you don't see it, means this website admin dare not to put it as a text string but make it an image, this along means choice A is dangerous and needs to be sanitized. lmao ~
upvoted 2 times
...
BD69
1 year, 1 month ago
Selected Answer: C
C because that link's querystring can be modified by a hacker, like so: www.website.com/[email protected] the email address would most likely be a database field. An SQLi could be appended to the query string (and not necessarily an injection that would produce data, but one that could, for example, TRUNCATE or DROP a table, or some other nasty)
upvoted 1 times
...
DannyTham
1 year, 5 months ago
What is the answer for A?
upvoted 1 times
...
Johnny_R
1 year, 5 months ago
Selected Answer: A
Don't see the A answer but others make no sense.
upvoted 2 times
...
ComPCertOn
1 year, 6 months ago
Selected Answer: A
Apparently A. XSS ( Cross Site Scripting )
upvoted 2 times
...
[Removed]
1 year, 7 months ago
Selected Answer: A
I don't know this one, so I go with the majority...
upvoted 2 times
...
Cisco103
1 year, 8 months ago
Selected Answer: A
Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and strings to prevent the injection of harmful codes into the system. Input sanitization prevent: SQLi and XSS So A. if there is an XSS
upvoted 3 times
...
touisuzuki
1 year, 8 months ago
Selected Answer: C
C. Email message: “Click this link to get your free gift card.” Input sanitization involves filtering and cleaning user or external input to remove potentially harmful or malicious content. In the case of email messages, input sanitization can help prevent users from clicking on links or downloading attachments that may lead to phishing attacks, malware, or other security threats. By sanitizing the content of emails, you can reduce the risk associated with deceptive or malicious email messages. The other examples are not directly related to input sanitization:
upvoted 2 times
Yomzie
1 year, 3 months ago
This is not handled by Input Sanitization. This sort of email is handled by the SPAM Filtering System. The answer is option A, as that is a likely framework for XSS.
upvoted 1 times
BD69
1 year, 1 month ago
Incorrect! Querystrings should ALWAYS be handled with care (input sanitize GETs too!). Any link provided to sign up for something or confirm something will have a querystring on it - in this case, most likely the email address. Because email addresses are stored in databases, a "click to get your free card" link would probably contain either the email explicitly or a string identifier, making it perfect for SQLi attack. As a veteran web developer, I've seen this attack many times and always sanitize querystrings and/or querystring parameters. (GET, POST, PUSH, DELETE, and PATCH HTTP verbs should all be sanitized)
upvoted 1 times
...
...
...
sujon_london
1 year, 8 months ago
Selected Answer: C
C. Email message: “Click this link to get your free gift card.” Input sanitization is a technique primarily used to validate and clean user or external input to prevent security vulnerabilities or malicious data from affecting a system, especially in web applications and data entry forms. In this case, the email message involves user interaction and clicking a link, which can potentially lead to security risks such as phishing or malicious links. Input sanitization in email content can help filter and validate links to prevent users from clicking on potentially harmful or malicious links. This C option represents a scenario where input sanitization (in the context of validating and cleaning the content of an email message) can play a role in mitigating security risks.
upvoted 1 times
...
jade33
1 year, 9 months ago
I go with A The best example that can be mitigated by input sanitization is XSS (Cross-Site Scripting) attack1. Input sanitization is the process of cleaning up user input data to prevent attacks such as XSS and protect the application from data corruption2. XSS is a type of security vulnerability that allows an attacker to inject malicious code into a web page viewed by other users. The attacker can then steal user data or perform actions on behalf of the user1. In contrast, nmap -p- 10.11.1.130 is a port scanning tool used to identify open ports on a network3. Email message: “Click this link to get your free gift card.” and Browser message: “Your connection is not private.” are examples of phishing and SSL/TLS certificate errors respectively
upvoted 1 times
...
shocky377
1 year, 9 months ago
Selected Answer: A
Its A, which is code that was run on the browser and you cant see (XSS attack)
upvoted 4 times
...
Chillbuddy
1 year, 9 months ago
Selected Answer: D
The most common techniques used against weak inputs are probably cross-site scripting (XSS) attacks, which involves attackers injecting malicious scripts into otherwise trustworthy websites.
upvoted 1 times
...
ApplebeesWaiter1122
1 year, 10 months ago
I also want to point out that Input Sanitization is on the COMPTIA objectives
upvoted 1 times
...
ApplebeesWaiter1122
1 year, 10 months ago
Selected Answer: B
Input sanitization is a technique used to cleanse and validate user input to prevent the introduction of malicious or unwanted data into a system. In the case of the email message, input sanitization could be used to check the validity of the link provided in the email and ensure it does not contain any malicious content or lead to a phishing website.
upvoted 1 times
sujon_london
1 year, 8 months ago
C. Email message: “Click this link to get your free gift card.” Input sanitization is a technique primarily used to validate and clean user or external input to prevent security vulnerabilities or malicious data from affecting a system, especially in web applications and data entry forms. In this case, the email message involves user interaction and clicking a link, which can potentially lead to security risks such as phishing or malicious links. Input sanitization in email content can help filter and validate links to prevent users from clicking on potentially harmful or malicious links. Option C represents a scenario where input sanitization (in the context of validating and cleaning the content of an email message) can play a role in mitigating security risks.
upvoted 2 times
BD69
1 year, 1 month ago
Exactly. A sign up link will typically have a querystring in it. In this case, an email address. They are ripe for SQLi attacks, if not sanitized.
upvoted 1 times
...
...
ApplebeesWaiter1122
1 year, 10 months ago
meant to put C
upvoted 1 times
ApplebeesWaiter1122
1 year, 10 months ago
I thought about this question over night and I think I will go with 'A' at first i thought it was an error with examtopics but now i think it is a blank input. If that is the case then Input Sanitization would fix this by making it be a required field
upvoted 5 times
cho0
1 year, 9 months ago
If you inspect the option elements, you will see option A is actually //<script>alert("Warning!");</script>. Basically, Examtopics got XSS'd by the option.
upvoted 11 times
...
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...