Exam CS0-003 All QuestionsBrowse all questions from this exam
Question 198

An employee is no longer able to log in to an account after updating a browser. The employee usually has several tabs open in the browser. Which of the following attacks was most likely performed?

    Correct Answer: C

    Cross-Site Request Forgery (CSRF) is an attack that tricks the victim into submitting a malicious request. It exploits the user's authenticated session with a target site, often leveraging multiple open browser tabs. CSRF can cause the user's browser to perform unwanted actions on the site the user is authenticated with, without the user's knowledge. Since the problem occurred after a browser update and considering that the employee has several tabs open, it is plausible that a CSRF attack led to session invalidation or account lockout when actions got triggered across tabs. Other options like RFI, LFI, and XSS are less likely to cause this specific scenario.

Discussion
499f1a0Option: C

CSRF is the correct answer because question mentions that the user has many tabs open usually so the cross-site request forgery makes sense

section8santaOption: C

CSRF attacks occur when a malicious website causes a user's browser to perform an unwanted action on a site where the user is authenticated, taking advantage of the user's active session. This could potentially be the case if the employee had an active session in a tab and a CSRF attack occurred from another tab or website, which could lead to session invalidation or account lockout.

SHADTECH123Option: C

Given that the issue occurred after updating the browser and the employee typically has several tabs open, it is more likely to be a Cross-Site Request Forgery (CSRF) attack. CSRF exploits the user's authenticated session and can be triggered without the user's direct interaction, often leveraging the presence of multiple open tabs. When a user has several tabs open, a malicious site in one tab can issue a request to a trusted site in another tab, performing unauthorized actions. XSS typically involves injecting and executing malicious scripts within the web pages the user visits, but it is less likely to be directly affected by a browser update. So, in this scenario, CSRF is the more likely culprit.

KmelaunOption: C

Certmaster Topic 14B: A cross-site request forgery (XSRF) can exploit applications that use cookies to authenticate users and track sessions. The attacker must convince the victim to start a session with the target site. The attacker then must pass an HTTP request to the victim's browser that spoofs an action on the target site (such as changing a password or an email address). This request could be disguised in a number of ways (as an image tag, for instance) and so could be accomplished without the victim necessarily having to click a link. If the target site assumes that the browser is authenticated (because there is a valid session cookie) and doesn't complete any additional authorization process on the attacker's input (or if the attacker is able to spoof the authorization), it will accept the input as genuine. This is also referred to as a confused deputy attack (the point being that the user and the user's browser are not necessarily the same thing).

sigmarseiferOption: C

The answer is C

NishawOption: D

The most likely attack in this scenario is Cross-Site Scripting (XSS). XSS attacks can be used to steal session cookies, which are often used for authentication. If the attacker successfully steals the session cookie, they can impersonate the user and access their account. In this case, the browser update may have introduced a vulnerability that allowed an XSS attack to occur.

j904Option: D

Without a doubt

MMK777Option: D

The injected script may interfere with the login process, preventing the employee from accessing their account. Therefore, XSS

myazureexamsOption: D

after reviewing certmater topic 14B and asking ChatGPT I go with D