Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA Exam CS0-003 Topic 1 Question 18 Discussion

Actual exam question for CompTIA's CS0-003 exam
Question #: 18
Topic #: 1
[All CS0-003 Questions]

A security analyst is trying to validate the results of a web application scan with Burp Suite. The security analyst performs the following:

Which of the following vulnerabilitles Is the securlty analyst trylng to valldate?

Show Suggested Answer Hide Answer
Suggested Answer: B

The security analyst is validating a Local File Inclusion (LFI) vulnerability, as indicated by the ''/.../.../.../'' in the GET request which is a common indicator of directory traversal attempts associated with LFI. The other options are not relevant for this purpose: SQL injection involves injecting malicious SQL statements into a database query; XSS involves injecting malicious scripts into a web page; CSRF involves tricking a user into performing an unwanted action on a web application.


According to the CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition1, one of the objectives for the exam is to ''use appropriate tools and methods to manage, prioritize and respond to attacks and vulnerabilities''. The book also covers the usage and syntax of Burp Suite, a tool used for testing web application security, in chapter 6. Specifically, it explains the meaning and function of each component in Burp Suite, such as Repeater, which allows the security analyst to modify and resend individual requests1, page 239. Therefore, this is a reliable source to verify the answer to the question.

Contribute your Thoughts:

Adell
6 months ago
Now I'm more confused. They could all fit at some point. I need to review Burp Suite examples.
upvoted 0 times
...
Rosalind
6 months ago
Hmm, I felt CSRF could be it. The token validation part threw me off.
upvoted 0 times
...
Lenny
7 months ago
Really? I was leaning towards LFI. Those file inclusions are classic.
upvoted 0 times
...
Bambi
7 months ago
I thought it was obvious. They're testing for XSS, right? The payload gave it away.
upvoted 0 times
...
Rashad
7 months ago
Seemed tricky to me. I wasn't sure if it was about SQL injection or something else.
upvoted 0 times
...
Adell
7 months ago
Hey, what do you think about that question on web application scans?
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77