Bofa Secure Coding
1. Bob received a mail from some unknown person. This mail was having a link to some blogging
website which contains free CS/IT and other study materials. Which of the following attacks can
occur when a malicious user convinces a victim (in this case Bob) to send a request to a server
with malicious input and the server echoes the input back to client?
Oa. Reflected XSS
Ob. Persistent XSS
Oc. Insecure direct object references
Od. Failure to restrict URL access
e. NA
2. Which of the following is most likely to result from invalidated redirects and forwards?
Oa. Brute force attack
Ob. Network sniffing
Oc. Man-in-the-middle attack
Od. Bypassed authorization checks
e. NA

Respuesta :

The request to the server that echoes can be sent as the input through the Reflected XSS. Bypassed authorization checks occur from unvalidated redirects and forwards. Thus, options a and d are correct.

What is Reflected XSS?

Reflected XSS is an attack that occurs as cross-site and takes place by the intervention of the malicious and suspicious injections of the contents through the links sent by the emails.

The suspicious link when clicked causes the attack of the viruses on the user's system. The link convinces the user to send a request to the server containing malicious and unsafe content.

The invalid malicious forwards and redirects result in the bypassed authorization checks. The scanners of the applications are not able to differentiate between the safe and the harmful content and lose the ability to access the right and the wrong.

Learn more about XSS here:

https://brainly.com/question/14780912

#SPJ1

ACCESS MORE