exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 397 discussion

Actual exam question from ISC's CISSP
Question #: 397
Topic #: 1
[All CISSP Questions]

Which of the following methods is MOST effective in mitigating Cross-Site Scripting (XSS) vulnerabilities within HyperText Markup Language (HTML) websites?

  • A. Use antivirus and endpoint protection on the server to secure the web-based application
  • B. Place the web-based system in a defined Demilitarized Zone (DMZ)
  • C. Use .NET framework with .aspx extension to provide a higher level of security to the web application so that the web server display can be locked down
  • D. Not returning any HTML tags to the browser client
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Voxycs
Highly Voted 1 year, 7 months ago
Here we go again...mass confusion. I'd go with D. FML
upvoted 5 times
...
a_kto_to
Most Recent 2 weeks ago
Selected Answer: D
Cross-Site Scripting (XSS) vulnerabilities occur when an attacker is able to inject malicious scripts (typically JavaScript) into web pages viewed by other users. These scripts are often embedded within HTML, and when executed by a user's browser, can compromise the integrity of the web application and the security of its users. The most effective way to mitigate XSS is to prevent the injection of executable code into web pages that is processed by the browser. Option D — Not returning any HTML tags to the browser client — effectively prevents XSS by ensuring that the input received by the application is treated as data rather than executable code. This can be done by sanitizing and escaping user inputs before rendering them as part of HTML output. For example, user-generated content such as comments or form submissions should have any potential HTML or JavaScript code encoded, so it is displayed as plain text rather than executed by the browser.
upvoted 1 times
...
BigITGuy
1 month, 2 weeks ago
Selected Answer: D
Most effective way is to ensure that HTML tags and scripts submitted by users are not returned or executed by the browser.
upvoted 1 times
...
tejas07jain
5 months, 3 weeks ago
Selected Answer: D
I think it's D. Does D make the most sense due to the Remote Browser Isolation feature / tool that offers this capability?
upvoted 1 times
...
1460168
9 months, 2 weeks ago
Selected Answer: D
Only D makes sense, because you need the ability to set html tags to run scripts.
upvoted 1 times
...
gjimenezf
1 year, 3 months ago
Selected Answer: D
XSS is a vulnerability that exploits the web browser of the user when it loads some malicious code returned from HTML tags to the web browser
upvoted 1 times
...
YesPlease
1 year, 4 months ago
Selected Answer: D
Answer D) https://www.verizon.com/business/resources/articles/s/how-to-mitigate-cross-site-scripting/#:~:text=Whenever%20possible%2C%20prohibit%20HTML%20code%20in%20inputs.%20Preventing%20users%20from%20posting%20HTML%20code%20into%20form%20inputs%20is%20a%20straightforward%20and%20effective%20measure.
upvoted 1 times
...
Soleandheel
1 year, 5 months ago
D. Not returning any HTML tags to the browser client. Cross-Site Scripting (XSS) vulnerabilities occur when untrusted data is included in a web page and executed as code in a user's browser. By not returning any HTML tags to the browser client, you are effectively preventing any malicious code injection into the page. This approach, known as output encoding or input validation, helps ensure that user input is treated as plain text and not as executable code. It's a fundamental security practice to prevent XSS attacks.
upvoted 2 times
...
InclusiveSTEAM
1 year, 6 months ago
The suggested answer D is correct The most effective method for mitigating Cross-Site Scripting (XSS) vulnerabilities within HTML websites is option D - not returning any HTML tags to the browser client. XSS exploits allow attackers to inject malicious client-side scripts. By not returning any HTML tags at all, you completely prevent the ability for attackers to inject active content that could execute scripts. This stops XSS at the root. Antivirus (A) cannot catch all XSS payloads. DMZs (B) only limit network access, not code injection. .NET (C) helps but does not inherently prevent all XSS like removing HTML tags does. By configuring the application to return no HTML tags, you guarantee malicious scripts have no entry point, shutting down potential XSS vectors altogether. This direct, foolproof approach makes it the most effective mitigation.
upvoted 3 times
...
HughJassole
1 year, 11 months ago
B. At work all web servers are in a DMZ, and this makes sense because the DMZ is separated from the rest of the infrastructure. The question talks about mitigation, even if someone runs a script since it's in the DMZ it won't go anywhere.
upvoted 1 times
...
Tygrond87
2 years ago
Selected Answer: C
I think D would make your website non functional so go with C ?
upvoted 1 times
jackdryan
2 years ago
A is correct
upvoted 1 times
...
...
Delab202
2 years, 1 month ago
Selected Answer: A
For the administrator of a website, defenses against XSS include maintaining a patched web server, using web application firewalls, operating a host-based intrusion detection system (HIDS), auditing for suspicious activity, and, most important, performing server-side input validation for length, malicious content, and metacharacter filtering. As a web user, you can defend against XSS by keeping your system patched, running antivirus software, and avoiding nonmainstream websites. There are add-ons for some web browsers, such as NoScript for Firefox and uBlock Origin for Chrome, that allow only scripts of your choosing to be executed.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago