exam questions

Exam SY0-601 All Questions

View all questions & answers for the SY0-601 exam

Exam SY0-601 topic 1 question 8 discussion

Actual exam question from CompTIA's SY0-601
Question #: 8
Topic #: 1
[All SY0-601 Questions]

A forensics investigator is examining a number of unauthorized payments that were reported on the company's website. Some unusual log entries show users received an email for an unwanted mailing list and clicked on a link to attempt to unsubscribe. One of the users reported the email to the phishing team, and the forwarded email revealed the link to be:
<a href="https://www.company.com/payto.do?routing=00001111&acct=22223334&amount=250">Click here to unsubscribe</a>
Which of the following will the forensics investigator MOST likely determine has occurred?

  • A. SQL injection
  • B. Broken authentication
  • C. XSS
  • D. XSRF
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Harambe0604
Highly Voted 2 years, 12 months ago
CSRF or XSRF redirects you to something you didn't intend to go to when clicking a link
upvoted 61 times
fboy
2 years, 11 months ago
thank you!
upvoted 8 times
...
...
tannuc
Highly Voted 1 year, 9 months ago
Selected Answer: D
XSRF or CSRF is the correct one, let me tell you why? -> using the Process of Elimination, we eliminate A and B, there is no thing to deal with SQL injection and Broken Authentication in this case. -> Only C (XXS) and D (XSRF). Remember about XXS, Cross-site scripting occurs when attackers try to inject JavaScript into the client's website. But D (XSRF), Cross-site-request-forgery, will inject the POST request to change email, address of shipping, or transfer funds. -> Pick D because the <a> link includes: routing=00001111&acct=22223334&amount=250
upvoted 29 times
...
Proctored_Expert
Most Recent 7 months, 2 weeks ago
Selected Answer: C
The forensics investigator will most likely determine that XSS (cross-site scripting) has occurred. XSS is a type of cyber attack that involves injecting malicious code into a website or web application, with the goal of executing the code in the context of the victim's browser. XSS attacks can be used to steal sensitive information, such as login credentials or personal data, or to manipulate the behavior of the website or application. The log entry provided in the question describes a link that was included in an email, which was clicked on by a user in an attempt to unsubscribe from an unwanted mailing list. Upon investigation, the forwarded email revealed that the link contained malicious code, specifically an XSS attack. This indicates that an XSS attack was carried out against the company's website.
upvoted 3 times
hieptran
2 years, 4 months ago
Wrong, CSRF utilized the current user session and use them to invoke the request on behalf of the victim. In this example, there is no malicious javascript payload that indicates there is a Reflected XSS vulnerability in their website. XSS is often used for session/cookie hijacking. But not this case.
upvoted 5 times
...
...
GS1011
7 months, 2 weeks ago
D “Cross site request forgery (CSRF), also known as XSRF, Sea Surf or Session Riding, is an attack vector that tricks a web browser into executing an unwanted action in an application to which a user is logged in. A successful CSRF attack can be devastating for both the business and user. It can result in damaged client relationships, unauthorized fund transfers, changed passwords and data theft—including stolen session cookies. CSRFs are typically conducted using malicious social engineering, such as an email or link that tricks the victim into sending a forged request to a server. As the unsuspecting user is authenticated by their application at the time of the attack, it’s impossible to distinguish a legitimate request from a forged one.” This link: https://www.imperva.com/learn/application-security/csrf-cross-site-request-forgery/ has more details.
upvoted 5 times
...
Protract8593
7 months, 2 weeks ago
Selected Answer: D
Cross-Site Request Forgery (XSRF) involves exploiting the trust that a website has in a user's browser by using the user's active session to invoke unauthorized actions on behalf of the victim. This is typically done by tricking the victim's browser into making unintended requests to a website, without the user's knowledge or consent. In the given example URL: https://www.company.com/payto.do?routing=00001111&acct=22223334&amount=250 If the website does not have proper security measures in place, an attacker could craft a malicious email with the link to this URL, and if a logged-in user clicks on the link while their session is active, the website may process the request as if the user intended it. As a result, the unauthorized payment of $250 could occur without the user's knowledge. Since the user reported the email to the phishing team, it suggests that the email was part of a malicious attempt to trick users into performing an unwanted action. Therefore, based on the details provided, the most likely occurrence is XSRF (Cross-Site Request Forgery).
upvoted 3 times
...
Thurams
7 months, 2 weeks ago
C. XSS (Cross-Site Scripting) The provided email link appears to be a classic example of a potential XSS attack. In this scenario, when a user clicks on the link to "unsubscribe," it may execute a malicious script that interacts with the company's website, specifically the "payto.do" page. The unusual log entries, including the email recipients clicking on the link, suggest that the website may be vulnerable to an XSS attack. Cross-Site Scripting involves injecting malicious code (scripts) into web applications, which are then executed by unsuspecting users. In this case, it's possible that the "unsubscribe" link contains a script that performs actions such as making unauthorized payments, as described in the scenario. The forensics investigator is likely to focus on XSS as the root cause of these unauthorized payments and investigate further to confirm this suspicion.
upvoted 4 times
233Matis
1 year, 4 months ago
XSS is usually written in JavaScript. This is not written in any language here and especially not JavaScript.
upvoted 1 times
...
...
MortG7
7 months, 2 weeks ago
What is CSRF? Also known as session riding or the one-click attack, a Cross-site request forgery (CSRF) is a web application cyberattack that tricks victims into unknowingly performing actions on the attacker’s behalf. CSRF attacks exploit a security flaw in web applications that cannot differentiate between a bad and legitimate request within an authenticated user session. Adversaries typically launch CSRF attacks using social engineering techniques to trick the victim user into loading a page or clicking a link containing a malicious request. The link sends a malicious request from the authenticated user’s browser to the target website.
upvoted 4 times
...
ImBleghk
7 months, 2 weeks ago
Selected Answer: C
Based on the provided information, the forensics investigator will likely determine that a Cross-Site Scripting (XSS) attack has occurred. In an XSS attack, an attacker injects malicious scripts into web pages that are viewed by other users. In this case, the link provided for unsubscribing contains HTML code (<a> tag), suggesting that the injected script could have been executed when users clicked on the link. The presence of a clickable link and the fact that users reported receiving unwanted emails and clicking on the link to unsubscribe are typical indicators of an XSS attack. Therefore, the most likely scenario is: C. XSS (Cross-Site Scripting)
upvoted 3 times
...
alicia2024
7 months, 2 weeks ago
Selected Answer: C
Based on the provided information, the forensics investigator would most likely determine that a Cross-Site Scripting (XSS) attack has occurred. XSS attacks involve injecting malicious scripts into web pages viewed by other users. In this scenario, the link provided in the forwarded email appears to be an attempt to unsubscribe from a mailing list, but it actually directs users to a URL that could be injecting malicious scripts into the company's website. When users click on the link, their browsers may execute the malicious script, which could lead to unauthorized actions such as making unauthorized payments. Therefore, the correct answer is: C. XSS (Cross-Site Scripting)
upvoted 1 times
...
Luchis_69
7 months, 2 weeks ago
Selected Answer: C
Cross-Site Request Forgery (XSRF or CSRF) typically involves tricking a user's browser into making unintended requests to a web application on which the user is authenticated. In XSRF attacks, an attacker crafts a request and tricks the victim into unknowingly executing the request, often through social engineering techniques like phishing emails. In the scenario described, the user voluntarily clicked on a link in an email, presumably with the intention of unsubscribing from a mailing list. This action was not initiated by a malicious actor. Instead, the link provided in the email could potentially exploit a vulnerability on the website, leading to unauthorized actions. Therefore, while XSRF attacks involve unauthorized requests being made on behalf of authenticated users, the scenario described does not fit the typical pattern of an XSRF attack. Instead, it aligns more closely with Cross-Site Scripting (XSS), where malicious scripts are injected into web pages to execute unauthorized actions in the context of the victim's browser.
upvoted 1 times
...
8b31a9f
10 months, 4 weeks ago
Playing Devils Advocate, but if "a forensic investigator is examining a number of unauthorized payments" wouldnt that imply authentication has been broken and an attacker was able to compromise passwords, users account info, etc and assume their identities to make unauthorized payments?
upvoted 1 times
...
Yoez
1 year ago
The truth is that I don't know what I can pay attention to, to study these things because the official answers say one thing but in the end everyone says another, I don't even know what to do.
upvoted 2 times
realkrome
1 year ago
Dont listen to the "official answers", Comtpia doesn't release any of the test questions, so really, no one knows 100% whats right/wrong. The people who upload the questions with the answers normally get the answers wrong because of their lack of knowledge, or to avoid having the questions taken down because its against Comptia's policy to provide answer keys associated with their questions, so sometimes they'll intentionally give wrong answers to loophole around this. Stick with the most voted answer and read the discussions. 9/10 times the "correct" answer is incorrect. Same goes with alot of free study guides out there.
upvoted 5 times
...
...
russian
1 year ago
Selected Answer: D
SQLi is manipulating database. Broken Authen. - authentication is broken; duuhh. XSS - html code is inserted into a web application. XSRF or CSRF - make users do certain actions that they do not intend to perform.
upvoted 2 times
...
JustJess
1 year, 1 month ago
I'm retracing my earlier comment. here is what broken authentication is Broken Authentication: Description: Broken authentication occurs when an attacker exploits vulnerabilities related to user authentication and session management. Relevance to the Scenario: Users received an email for an unwanted mailing list. They clicked on a link to attempt to unsubscribe. The forwarded email revealed the link: Click here to unsubscribe.
upvoted 1 times
JustJess
1 year, 1 month ago
he link provided appears to be related to account management (unsubscribing). Broken authentication vulnerabilities could allow unauthorized access to sensitive features or actions, such as unsubscribing. In this case, the link might lead to an unauthorized payment or other malicious activity.
upvoted 1 times
...
...
JustJess
1 year, 1 month ago
Some unusual log entries show users received an email for an unwanted mailing list and clicked on a link to attempt to unsubscribe. users are making a request to unsubscribe. I would go with XSFR
upvoted 1 times
...
Sareena13
1 year, 2 months ago
I need to know which answer I should think of in this question. According to me option D is the best choice but the answer is given Option B. Can someone give some clarity regarding this?
upvoted 1 times
...
zeeshanali1993
1 year, 3 months ago
Selected Answer: C
In an XSS attack, malicious scripts are injected into web pages that are then viewed by other users. In this case, the link in the email appears to be crafted in a way that could potentially execute unauthorized scripts on the user's browser when they click on it.
upvoted 2 times
TrueKiwi
1 year, 2 months ago
In XSS, the code is injected into a benign or trusted website. Given this example, XSRF is much more likely. Especially because of the misleading link name.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago