New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 CISSP Exam - Topic 3 Question 103 Discussion

Actual exam question for ISC2's CISSP exam
Question #: 103
Topic #: 3
[All CISSP Questions]

An input validation and exception handling vulnerability has been discovered on a critical web-based system. Which of the following is MOST suited to quickly implement a control?

Show Suggested Answer Hide Answer
Suggested Answer: A

Adding a new rule to the application layer firewall is the most suited to quickly implement a control for an input validation and exception handling vulnerability on a critical web-based system. An input validation and exception handling vulnerability is a type of vulnerability that occurs when a web-based system does not properly check, filter, or sanitize the input data that is received from the users or other sources, or does not properly handle the errors or exceptions that are generated by the system. An input validation and exception handling vulnerability can lead to various attacks, such as:

Injection attacks, such as SQL injection, command injection, or cross-site scripting (XSS), where the attacker inserts malicious code or commands into the input data that are executed by the system or the browser, resulting in data theft, data manipulation, or remote code execution.

Buffer overflow attacks, where the attacker sends more input data than the system can handle, causing the system to overwrite the adjacent memory locations, resulting in data corruption, system crash, or arbitrary code execution.

Denial-of-service (DoS) attacks, where the attacker sends malformed or invalid input data that cause the system to generate excessive errors or exceptions, resulting in system overload, resource exhaustion, or system failure.

An application layer firewall is a device or software that operates at the application layer of the OSI model and inspects the application layer payload or the content of the data packets. An application layer firewall can provide various functions, such as:

Filtering the data packets based on the application layer protocols, such as HTTP, FTP, or SMTP, and the application layer attributes, such as URLs, cookies, or headers.

Blocking or allowing the data packets based on the predefined rules or policies that specify the criteria for the application layer protocols and attributes.

Logging and auditing the data packets for the application layer protocols and attributes.

Modifying or transforming the data packets for the application layer protocols and attributes.

Adding a new rule to the application layer firewall is the most suited to quickly implement a control for an input validation and exception handling vulnerability on a critical web-based system, because it can prevent or reduce the impact of the attacks by filtering or blocking the malicious or invalid input data that exploit the vulnerability. For example, a new rule can be added to the application layer firewall to:

Reject or drop the data packets that contain SQL statements, shell commands, or script tags in the input data, which can prevent or reduce the injection attacks.

Reject or drop the data packets that exceed a certain size or length in the input data, which can prevent or reduce the buffer overflow attacks.

Reject or drop the data packets that contain malformed or invalid syntax or characters in the input data, which can prevent or reduce the DoS attacks.

Adding a new rule to the application layer firewall can be done quickly and easily, without requiring any changes or patches to the web-based system, which can be time-consuming and risky, especially for a critical system. Adding a new rule to the application layer firewall can also be done remotely and centrally, without requiring any physical access or installation on the web-based system, which can be inconvenient and costly, especially for a distributed system.

The other options are not the most suited to quickly implement a control for an input validation and exception handling vulnerability on a critical web-based system, but rather options that have other limitations or drawbacks. Blocking access to the service is not the most suited option, because it can cause disruption and unavailability of the service, which can affect the business operations and customer satisfaction, especially for a critical system. Blocking access to the service can also be a temporary and incomplete solution, as it does not address the root cause of the vulnerability or prevent the attacks from occurring again. Installing an Intrusion Detection System (IDS) is not the most suited option, because IDS only monitors and detects the attacks, and does not prevent or respond to them. IDS can also generate false positives or false negatives, which can affect the accuracy and reliability of the detection. IDS can also be overwhelmed or evaded by the attacks, which can affect the effectiveness and efficiency of the detection. Patching the application source code is not the most suited option, because it can take a long time and require a lot of resources and testing to identify, fix, and deploy the patch, especially for a complex and critical system. Patching the application source code can also introduce new errors or vulnerabilities, which can affect the functionality and security of the system. Patching the application source code can also be difficult or impossible, if the system is proprietary or legacy, which can affect the feasibility and compatibility of the patch.


Contribute your Thoughts:

0/2000 characters
Garry
2 months ago
Surprised they found this vulnerability in such a critical system!
upvoted 0 times
...
Milly
2 months ago
Adding a rule to the firewall could help, but not a full fix.
upvoted 0 times
...
Lamonica
3 months ago
An IDS won't stop the issue quickly enough.
upvoted 0 times
...
Shantell
3 months ago
I think blocking access is too extreme.
upvoted 0 times
...
Nu
3 months ago
Patching the application source code is the best way to fix this.
upvoted 0 times
...
Tyra
3 months ago
I feel like installing an IDS could help monitor the situation, but it doesn't directly address the vulnerability right away.
upvoted 0 times
...
Reynalda
4 months ago
I think patching the application source code is the best long-term solution, but it might take time to implement.
upvoted 0 times
...
Carlota
4 months ago
Blocking access seems drastic, but if the vulnerability is critical, it might be the fastest way to prevent exploitation.
upvoted 0 times
...
Glenn
4 months ago
I remember we discussed how application layer firewalls can help with input validation, but I'm not sure if that's the quickest fix.
upvoted 0 times
...
Alyce
4 months ago
I feel pretty confident that the best option here is D - patching the application source code. That's going to be the most direct and effective way to resolve the input validation and exception handling vulnerability. The other choices are more indirect or temporary fixes.
upvoted 0 times
...
Goldie
4 months ago
Okay, let's see here. Adding a rule to the firewall (A) or installing an IDS (C) might help detect and block the issue, but they don't actually fix the underlying vulnerability. Blocking access to the service (B) is a bit drastic. I'm leaning towards D - patching the source code to address the root cause.
upvoted 0 times
...
Haydee
5 months ago
Hmm, I'm a bit unsure about this one. The options seem to focus on different security controls, but I'm not sure which one would be the MOST suited for quickly implementing a fix. I'll have to think this through carefully.
upvoted 0 times
...
Rolland
5 months ago
This looks like a straightforward question about quickly implementing a control for an input validation and exception handling vulnerability. I think the answer is probably D - patching the application source code, since that would directly address the vulnerability at the root cause.
upvoted 0 times
...
Aleisha
7 months ago
I don't know, guys. I'm feeling a bit like a doctor here - do I go with the quick-fix bandage (A), or do I perform surgery and get to the root of the problem (D)? Tough call, but I think D is the way to go.
upvoted 0 times
Barb
5 months ago
D) Patch the application source code
upvoted 0 times
...
Leota
6 months ago
A) Add a new rule to the application layer firewall
upvoted 0 times
...
...
Kenny
7 months ago
Haha, imagine trying to install an IDS on a critical web-based system. That's like trying to put a Band-Aid on a bullet wound. Nah, I'm going with D - patch that code and be done with it!
upvoted 0 times
...
Malcom
7 months ago
Hmm, I'm not so sure. Blocking access to the service might be a quick fix, but it could disrupt business operations. I'd lean towards the firewall option, A, to at least contain the issue for now.
upvoted 0 times
Frederica
7 months ago
Yeah, adding a new rule to the firewall seems like a safer bet to quickly control the vulnerability.
upvoted 0 times
...
Emmett
7 months ago
I agree, blocking access could cause more problems than it solves.
upvoted 0 times
...
...
Justa
8 months ago
I'm not sure, but I think installing an Intrusion Detection System could also help detect and prevent future vulnerabilities.
upvoted 0 times
...
Mira
8 months ago
I agree with Karl, patching the source code is the most effective way to fix the vulnerability.
upvoted 0 times
...
Karl
8 months ago
I think we should patch the application source code.
upvoted 0 times
...
Kirk
8 months ago
Wow, this is a tricky one. I'd go with option D - patching the application source code. That's the most direct way to address the vulnerability, right?
upvoted 0 times
Andra
7 months ago
I see your point. It's important to address the root cause of the vulnerability first.
upvoted 0 times
...
Micah
8 months ago
True, an IDS can provide an additional layer of security, but patching the source code is more direct.
upvoted 0 times
...
Blondell
8 months ago
But wouldn't installing an Intrusion Detection System (IDS) also help in detecting and preventing future attacks?
upvoted 0 times
...
My
8 months ago
True, an IDS can provide an additional layer of security, but patching the source code is still the most direct solution.
upvoted 0 times
...
Glory
8 months ago
I agree, patching the application source code is the best way to fix the vulnerability.
upvoted 0 times
...
Pamela
8 months ago
But wouldn't installing an Intrusion Detection System (IDS) also help in detecting and preventing future attacks?
upvoted 0 times
...
Rochell
8 months ago
I agree, patching the application source code is the best way to fix the vulnerability.
upvoted 0 times
...
...

Save Cancel