Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Oracle Exam 1Z0-1104-23 Topic 1 Question 23 Discussion

Actual exam question for Oracle's 1Z0-1104-23 exam
Question #: 23
Topic #: 1
[All 1Z0-1104-23 Questions]

Challenge 4 - Task 4 of 6

Configure Web Application Firewall to Protect Web Server Against XSS Attack

Scenario

You have to protect web applications hosted on OCI from cross-site scripting (XSS) attacks. You can use the OCI Web Application Firewall (WAF) capabilities to create rules that compare against incoming requests to determine if the request contains an XSS attack payload. If a request is determined to be an attack, WAF should return the HTTP Service Unavailable (503) error.

To ensure that the configured WAF blocks the XSS attack, run the following script:[http:///index.html?

/index.html?

)

To complete this deployment, you have to perform the following tasks in the environment provisioned for you:

Configure a Virtual Cloud Network (VCN)

Create a Compute Instance and install the Web Server

Create a Load Balancer and update Security List

Create a WAF policy

Configure Protection Rules against XSS attacks

Verify the created environment against XSS attacks

Note:You are provided with access to an OCI Tenancy, an assigned compartment, and OCI credentials. Throughout your exam, ensure to use the assigned Compartment 99233424-C01 and Region us-ashburn-1.

Complete the following task in the provisioned OCI environment:

Create a WAF policy with the nameIAD-SP-PBT-WAF-01_99233424-lab.user01

Eg: IAD-SP-PBT-WAF-01_99232403-lab.user02

Show Suggested Answer Hide Answer
Suggested Answer: A

SOLUTION:

From the navigation menu, select Identity & Security. Navigate to Web Application Firewall and click Policies under it.

From the left navigation pane, under List Scope, select <your working compartment> from the drop-down menu.

Click Create WAF Policy.

The Create WAF Policy dialogue box appears. Creating a WAF policy consists of the following sections accessible from the left-side navigation:

a) Basic information

b) Access control

c) Rate limiting

d) Protections

e) Select enforcement point

f) Review and create.

In the Basic Information section:

a) Name: IAD-SP-PBT-WAF-01_99233424-lab.user01

b) WAF Policy Compartment: Select your working compartment

c) Action: Keep the default preconfigured actions; do not edit.

d) Click the Select enforcement point section accessible from the left-side navigation.

Note: You will configure the other section later in this practice. You will directly configure the Enforcement point.

In the Select enforcement point section:a) Add Firewalls: Select a load balancer IAD-SP-PBT-LB-01 in your current compartment from the list. b) Click Next for Review and Create.

Under the Review and Create Section:a) Verify the enforcement point added in the previous step.

Click Create WAF Policy.

The Create WAF Policy dialogue box closes, and you are returned to the WAF Policy page. The WAF policy you created is listed.


Contribute your Thoughts:

Argelia
4 months ago
Yes, it's crucial to verify the environment against XSS attacks to ensure the protection is working as expected.
upvoted 0 times
...
Catrice
4 months ago
Creating a WAF policy with specific rules can help block those attacks effectively.
upvoted 0 times
...
Sabra
4 months ago
Haha, I hope the 'background:url(javascript:alert(1))' part doesn't set off any alarms. Gotta love those XSS attacks!
upvoted 0 times
...
Ivette
4 months ago
I wonder if there's a trick question hidden in the scenario. Better double-check everything!
upvoted 0 times
...
Tawna
4 months ago
I agree, XSS attacks can be very harmful to web applications.
upvoted 0 times
...
Ryan
4 months ago
Hmm, the script to test the XSS attack is interesting. I'll have to make sure the WAF blocks that properly.
upvoted 0 times
Celestina
3 months ago
Testing the environment against XSS attacks is a key step to ensure protection.
upvoted 0 times
...
Rodolfo
4 months ago
Don't forget to update the Security List after creating the Load Balancer.
upvoted 0 times
...
Jerry
4 months ago
Installing the Web Server on the Compute Instance is crucial for this setup.
upvoted 0 times
...
Lillian
4 months ago
Make sure to configure the WAF policy with the correct name as mentioned in the task.
upvoted 0 times
...
...
Catrice
5 months ago
I think configuring a Web Application Firewall is important for protecting against XSS attacks.
upvoted 0 times
...
Kerry
5 months ago
Ah, I see we need to create a specific WAF policy name. That's a nice detail to watch out for.
upvoted 0 times
...
Lonny
5 months ago
Okay, this seems straightforward. I'll need to configure the WAF policy and the protection rules against XSS attacks.
upvoted 0 times
Bo
4 months ago
Finally, I'll create the WAF policy and configure the Protection Rules against XSS attacks
upvoted 0 times
...
Whitney
4 months ago
Next, I'll create a Load Balancer and update the Security List
upvoted 0 times
...
Roslyn
4 months ago
User B
upvoted 0 times
...
Luann
5 months ago
After that, I'll create a Compute Instance and install the Web Server
upvoted 0 times
...
Bernardo
5 months ago
User A
upvoted 0 times
...
Delisa
5 months ago
I'm going to start by configuring the Virtual Cloud Network (VCN)
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77