Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 98 Topic 10 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 98 Topic 10 Discussion

312-50v13 Exam Topic 10 Question 98 Discussion:
Question #: 98
Topic #: 10

A penetration tester finds that a web application does not properly validate user input and is vulnerable to reflected Cross-Site Scripting (XSS). What is the most appropriate approach to exploit this vulnerability?


A.

Perform a brute-force attack on the user login form to steal credentials


B.

Embed a malicious script in a URL and trick a user into clicking the link


C.

Inject a SQL query into the search form to attempt SQL injection


D.

Use directory traversal to access sensitive files on the server


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.