exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 346 discussion

Actual exam question from CompTIA's CS0-003
Question #: 346
Topic #: 1
[All CS0-003 Questions]

An XSS vulnerability was reported on one of the public websites of a company. The security department confirmed the finding and needs to provide a recommendation to the application owner. Which of the following recommendations will best prevent this vulnerability from being exploited? (Choose two.)

  • A. Implement an IPS in front of the web server.
  • B. Enable MFA on the website.
  • C. Take the website offline until it is patched.
  • D. Implement a compensating control in the source code.
  • E. Configure TLS v1.3 on the website.
  • F. Fix the vulnerability using a virtual patch at the WAF.
Show Suggested Answer Hide Answer
Suggested Answer: DF 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Justheretolook
1 month ago
Selected Answer: DF
The best recommendations to prevent the XSS (Cross-Site Scripting) vulnerability from being exploited are: D. Implement a compensating control in the source code F. Fix the vulnerability using a virtual patch at the WAF Explanation: • D. Implement a compensating control in the source code This is the most effective and permanent fix. Proper input validation, output encoding, and sanitization in the source code prevent XSS from occurring. • F. Fix the vulnerability using a virtual patch at the WAF (Web Application Firewall) A virtual patch is a temporary solution that blocks exploit attempts until a permanent code fix is implemented. This helps reduce risk immediately without altering application code.
upvoted 1 times
...
Only12go
1 month, 2 weeks ago
Selected Answer: DF
D Implement a compensating control in the source code (e.g., input validation, output encoding, Content-Security-Policy) Fixes the root cause inside the application so untrusted data can no longer be rendered as active script in the browser. F Apply a virtual patch at the WAF Provides an immediate, centrally managed rule set that filters or sanitises malicious XSS payloads while the development team works on the permanent code fix.
upvoted 1 times
...
noa808a
2 months ago
Selected Answer: DF
F is for sure 1/2 of the answers. For me, it's a 50/50 tossup between C and D. Taking the website offline would obviously prevent any exploitation, but would be a major hit to availability, where as implementing a compensating control would help to mitigate the vulnerability while maintaining availability.
upvoted 2 times
...
BlackSkullz
2 months, 1 week ago
Selected Answer: DF
I think D and F. While it does say "best way" and taking the server offline would technically be best, it just doesn't seem practical and would affect uptime and availability of company services. D and F would correct the issue at hand and keep the website up at the same time
upvoted 1 times
...
1403ad2
4 months ago
Selected Answer: CF
I think fixing the server with a WAF because its public facing website and taking the website off online is possible because it mentions "one of the public websites of a company"
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...