exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 17 discussion

Actual exam question from CompTIA's CS0-003
Question #: 17
Topic #: 1
[All CS0-003 Questions]

The security team reviews a web server for XSS and runs the following Nmap scan:

Which of the following most accurately describes the result of the scan?

  • A. An output of characters > and " as the parameters used m the attempt
  • B. The vulnerable parameter ID http://172.31.15.2/1.php?id-2 and unfiltered characters returned
  • C. The vulnerable parameter and unfiltered or encoded characters passed > and " as unsafe
  • D. The vulnerable parameter and characters > and " with a reflected XSS attempt
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Narobi
Highly Voted 1 year, 6 months ago
Selected Answer: D
I was originally going to go with B, but the syntax of the parameter is incorrect at the end (has id-2 and not id=2) which negated this choice as a potentially valid answer. This would make D the only viable correct answer.
upvoted 8 times
Narobi
1 year, 6 months ago
Syntax is correct on real exam. Still went with D. Scored around 820.
upvoted 19 times
...
...
Styvm14
Most Recent 1 month, 2 weeks ago
Selected Answer: D
This was specifically an XSS (Cross-Site Scripting) scan, as mentioned in the introduction The script "http-unsafe-output-escaping" was used, which specifically tests for reflected XSS vulnerabilities The characters > and " were successfully injected into the parameter These characters are particularly significant in XSS attacks as they can be used to break out of HTML tags and attributes Answer D is indeed the most accurate because: D. The vulnerable parameter and characters > and " with a reflected XSS attempt This option correctly identifies: There is a vulnerable parameter (id) The specific characters > and " were tested Most importantly, it specifically mentions this was a "reflected XSS attempt" - which aligns with the purpose of the scan Option C mentions "unfiltered or encoded characters" but misses the critical point that this was specifically testing for reflected XSS vulnerability, which is the main purpose of this particular Nmap script.
upvoted 2 times
...
cy_analyst
8 months, 2 weeks ago
Selected Answer: D
Answer C focuses on identifying the vulnerability and the unsafe handling of characters, but does not go as far as to indicate an active exploit attempt. It’s more about describing the vulnerability itself. Answer D goes further by implying that the unfiltered characters (>, ") are part of a reflected XSS attack, indicating that the vulnerability has been or can be actively exploited.
upvoted 4 times
...
sigmarseifer
1 year, 1 month ago
Answer is C *ChatGPT-4o This option accurately describes the issue identified by the scan, which is that the characters > and " are being reflected in the response from the server without proper filtering or encoding. This indicates a potential reflected XSS vulnerability.
upvoted 3 times
...
kumax
1 year, 8 months ago
Selected Answer: D
ChatGPT
upvoted 2 times
...
ms123451
1 year, 9 months ago
Selected Answer: D
it is mentioned that it is reflected in the output
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...