Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Alice discovers a reflected XSS flaw in her web application. Which of the follow

ID: 3745582 • Letter: A

Question

Alice discovers a reflected XSS flaw in her web application. Which of the following is a valid method for Alice to patch the reflected XSS vulnerability? (Use only a, b, c, or d as answer) a. Ensure that the entire website uses HTTPS. b. Classify data processed, stored, or transmitted by an application. Identify which data is sensitive according to privacy laws, regulatory requirements, or business needs. c. Escape untrusted HTTP request data with respect to context in the HTML output. d. Implement multi-factor authentication.

Explanation / Answer

Correct option is (c)

Explanation:

XSS vulnerability injects malicious code to legitimate webapp.

It can be prevented by making sure malicious input isn't interpreted in any executable manner. So, we can escape untrusted request data so that malicious data isn't executed as code.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote