exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 322 discussion

Actual exam question from CompTIA's CS0-002
Question #: 322
Topic #: 1
[All CS0-002 Questions]

A security analyst sees the following OWASP ZAP output from a scan that was performed against a modern version of Windows while testing for client-side vulnerabilities:


Alert Detail -
Low (Medium) Web Browser XSS Protection not enabled
Description: Web browser XSS protection not enabled, or disabled by the configuration of the HTTP Response header

URL: https://domain.com/sun/ray -

Which of the following is the MOST likely solution to the listed vulnerability?

  • A. Enable the browsers XSS filter
  • B. Enable Windows XSS protection.
  • C. Enable the browser’s protected pages mode.
  • D. Enable server-side XSS protection.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
SecurityGuyPP
1 year, 8 months ago
Selected Answer: D
D is a better choice. Browser XSS Protection is already deprecated by Edge, Chrome, and Firefox. Server-side XSS not only protect the end-user, but many other users.
upvoted 1 times
...
skibby16
1 year, 9 months ago
Selected Answer: A
The OWASP ZAP output indicates that the web browser's XSS (Cross-Site Scripting) protection is not enabled or is disabled by the configuration of the HTTP Response header. To address this vulnerability, you should enable the browser's XSS filter. This filter helps protect against certain types of client-side XSS attacks by identifying and blocking malicious scripts from executing in the browser.
upvoted 3 times
...
rg00
1 year, 10 months ago
Selected Answer: D
A security analyst should also consider that other users will also access the website, so a server side fix is necessary. Implementing a fix on your own machine/browser will not fix the vulnerability on another users' machines/browsers.
upvoted 1 times
...
justauser
2 years ago
Selected Answer: D
Agree with karpal, source cited is very clear.
upvoted 1 times
...
karpal
2 years ago
Selected Answer: D
"Web Browser XSS Protection not enabled" means that Web browser XSS protection is not enabled or is disabled by the configuration of the 'X-XSS-Protection' HTTP response header on the webserver. Refrence: https://www.ibm.com/docs/en/cdfsp/7.6.1.x?topic=checklist-vulnerability-web-browser-xss-protection
upvoted 3 times
...
justauser
2 years, 2 months ago
Selected Answer: A
GPT: To mitigate this vulnerability, you should enable the browser's XSS filter. This is the most appropriate solution among the given options because it directly addresses the issue identified in the scan output. Here's a brief explanation of the other options: B. Enable Windows XSS protection: This is not the correct solution because the issue is related to the web browser and not the underlying Windows operating system. C. Enable the browser's protected pages mode: While this might provide some protection against certain attacks, it is not specifically related to XSS protection and would not fully address the identified vulnerability. D. Enable server-side XSS protection: While server-side XSS protection is important, it is not the direct solution to the issue identified in the scan output. The vulnerability in question is related to the browser's XSS filter, which is a client-side protection mechanism
upvoted 1 times
rg00
1 year, 10 months ago
Browser XSS Protection is already deprecated. D would be the better choice.
upvoted 1 times
...
...
HereToStudy
2 years, 3 months ago
Selected Answer: A
Enabling server-side XSS protection is not a direct solution to the vulnerability identified in the alert, as it would not address the configuration of the HTTP Response header.
upvoted 1 times
...
OnA_Mule
2 years, 3 months ago
Selected Answer: A
I'm going with A. There's nothing that says that domain.com is your company's webserver, so implementing a server-side fix may not be an option. A client-side fix is certainly under your control, so I think it's the best answer.
upvoted 4 times
2Fish
2 years, 3 months ago
After seeing this again, I am thinking A is correct for exactly what you are saying. We as users do have the ability to adjust our browser. The configuration could have been changed from a malicious site.
upvoted 1 times
Adji91
2 years, 3 months ago
Thank you for your explanation.
upvoted 1 times
...
...
rg00
1 year, 10 months ago
As a security analyst, you should not scan a web app without consent/permission. A security analyst should also consider that other users will also access the website, so a server side fix is more suitable. Implementing a client-side fix on YOUR machine will not fix the vulnerability on ANOTHER machine.
upvoted 1 times
...
...
db97
2 years, 4 months ago
Agree with D
upvoted 2 times
...
AaronS1990
2 years, 4 months ago
"while testing for client-side vulnerabilities" Why then would we use XSS on the server side?
upvoted 1 times
robullo
2 years, 4 months ago
OWASP ZAP checks for a specific record in the response header, so it must be configured on the server.
upvoted 6 times
2Fish
2 years, 3 months ago
Thanks for the added context. Agreed!
upvoted 1 times
...
AaronS1990
2 years, 4 months ago
Thank you for the response
upvoted 1 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...