exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 387 discussion

Actual exam question from CompTIA's CS0-003
Question #: 387
Topic #: 1
[All CS0-003 Questions]

The security team reviews a web server for XSS and runs the following Nmap scan:



Which of the following most accurately describes the result of the scan?

  • A. An output of characters > and " as the parameters used in the attempt
  • B. The vulnerable parameter ID http://172.31.15.2/1.php?id=2 and unfiltered characters returned
  • C. The vulnerable parameter and unfiltered or encoded characters passed > and " as unsafe
  • D. The vulnerable parameter id=2 with a SQL injection attempt
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Kaneshiro
2 days, 9 hours ago
Selected Answer: C
This is the same as question 17, but the answer is D. The vulnerable parameter and characters > and " with a reflected XSS attempt. But here in question 387, the answer is C. The vulnerable parameter and unfiltered or encoded characters passed > and " as unsafe. This option is also in question 17, but it's incorrect there, while here in question 387 it's correct, and option D. The vulnerable parameter and characters > and " with a reflected XSS attempt. It's not available, and the following appears: D. The vulnerable parameter id=2 with a SQL injection attempt. Which is incorrect in this case. Does anyone know why? Link to question: https://www.examtopics.com/exams/comptia/cs0-003/view/
upvoted 1 times
...
Justheretolook
2 months, 1 week ago
Selected Answer: C
The correct answer is: C. The vulnerable parameter and unfiltered or encoded characters passed > and “ as unsafe Explanation: The Nmap scan using the http-unsafe-output-escaping script found that the parameter id at http://172.31.15.2/1.php?id=2 reflects special characters like >, ", and ' in its output without proper escaping. This behavior is a key indicator of a potential Cross-Site Scripting (XSS) vulnerability, where user-supplied input is reflected back in the response and interpreted as executable code in the browser.
upvoted 1 times
...
panzer
4 months, 3 weeks ago
Selected Answer: C
C. Because the parameters specific to XSS, have returned reflected - Correct A. Wrong, because it doesn't sepcify anywere that an output was observed B. Wrong, because it isn't specified anywhere that the parameters were returned D. Wrdong, SQLi could be identified by errors, or by delaied time because of the specific payload. Which was not observed here.
upvoted 4 times
...
DARKVEGETA
5 months, 1 week ago
Selected Answer: D
Answer is D
upvoted 1 times
...
DARKVEGETA
5 months, 1 week ago
Selected Answer: D
The answer is D. Not sure why this is marked at C. This is the exact same question for question 17 in the beginning of this practice exam and it was marked D as well.
upvoted 1 times
Kaneshiro
2 days, 9 hours ago
Yes, This is the same as question 17, but the answer is D. The vulnerable parameter and characters > and " with a reflected XSS attempt. But here in question 387, the answer is C. The vulnerable parameter and unfiltered or encoded characters passed > and " as unsafe. This option is also in question 17, but it's incorrect there, while here in question 387 it's correct, and option D. The vulnerable parameter and characters > and " with a reflected XSS attempt. It's not available, and the following appears: D. The vulnerable parameter id=2 with a SQL injection attempt. Which is incorrect in this case.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...