New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 SSCP Exam - Topic 10 Question 90 Discussion

Actual exam question for ISC2's SSCP exam
Question #: 90
Topic #: 10
[All SSCP Questions]

Which of the following statements pertaining to stream ciphers is correct?

Show Suggested Answer Hide Answer
Suggested Answer: A

XSS or Cross-Site Scripting is a threat to web applications where malicious code is placed on a website that attacks the use using their existing authenticated session status.

Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted web sites. Cross-site scripting (XSS) attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user in the output it generates without validating or encoding it.

An attacker can use XSS to send a malicious script to an unsuspecting user. The end user's browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by your browser and used with that site. These scripts can even rewrite the content of the HTML page.

Mitigation:

Configure your IPS - Intrusion Prevention System to detect and suppress this traffic.

Input Validation on the web application to normalize inputted data.

Set web apps to bind session cookies to the IP Address of the legitimate user and only permit that IP Address to use that cookie.

See the XSS (Cross Site Scripting) Prevention Cheat Sheet

See the Abridged XSS Prevention Cheat Sheet

See the DOM based XSS Prevention Cheat Sheet

See the OWASP Development Guide article on Phishing.

See the OWASP Development Guide article on Data Validation.

The following answers are incorrect:

Intrusion Detection Systems: Sorry. IDS Systems aren't usually the target of XSS attacks but a properly-configured IDS/IPS can 'detect and report on malicious string and suppress the TCP connection in an attempt to mitigate the threat.

Firewalls: Sorry. Firewalls aren't usually the target of XSS attacks.

DNS Servers: Same as above, DNS Servers aren't usually targeted in XSS attacks but they play a key role in the domain name resolution in the XSS attack process.

The following reference(s) was used to create this question:

CCCure Holistic Security+ CBT and Curriculum

and

https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29


Contribute your Thoughts:

0/2000 characters
Timothy
3 months ago
Asymmetric? Nah, that’s not what stream ciphers are about. A is incorrect.
upvoted 0 times
...
Doretha
3 months ago
Wait, I thought stream ciphers were good for hardware? D seems off.
upvoted 0 times
...
Harrison
3 months ago
A stream cipher is actually faster than a block cipher, so C is wrong.
upvoted 0 times
...
Beula
4 months ago
Totally agree, B is the right answer!
upvoted 0 times
...
Silvana
4 months ago
B is correct, stream ciphers do generate a keystream.
upvoted 0 times
...
Leatha
4 months ago
I vaguely recall that stream ciphers can be used in hardware, so D doesn't sound right to me either.
upvoted 0 times
...
Tom
4 months ago
I’m not sure, but I feel like stream ciphers are generally faster than block ciphers, so C could be misleading.
upvoted 0 times
...
Jesusita
4 months ago
I remember that stream ciphers do generate a keystream, which is used for encryption, so B might be the right answer.
upvoted 0 times
...
Timmy
5 months ago
I think stream ciphers are actually symmetric, not asymmetric, so A seems wrong.
upvoted 0 times
...
Carmela
5 months ago
I'm a little confused by the wording of the question. Is it asking which statement is correct, or which one is incorrect? I'll need to read it through a few times to make sure I'm interpreting it correctly.
upvoted 0 times
...
Colton
5 months ago
Okay, let's think this through step-by-step. A stream cipher generates a keystream, so that's definitely option B. I just need to double-check the other options to make sure I'm not missing anything.
upvoted 0 times
...
Denae
5 months ago
Hmm, I'm a bit unsure about the differences between stream ciphers and block ciphers. I'll need to review my notes carefully to make sure I understand the key characteristics.
upvoted 0 times
...
Ceola
5 months ago
This looks like a straightforward question on stream ciphers. I'm pretty confident I can handle this one.
upvoted 0 times
...
Arlene
5 months ago
This looks like a classic Salesforce Flows question. I'm pretty confident that's the right answer here.
upvoted 0 times
...
Leontine
5 months ago
If I remember correctly, citizens can act on a felony if they believe it was committed. So I'm tempted to say D isn't true, but it's all a bit blurry right now.
upvoted 0 times
...
Erasmo
5 months ago
I think I've got a good handle on this. The key is identifying the requirements that can be met through field configurations versus those that might need additional development. I'll make sure to double-check my work before submitting.
upvoted 0 times
...
Gerald
10 months ago
I'm just glad they didn't ask about the stream cipher's connection to the Loch Ness Monster. That would have been a real head-scratcher.
upvoted 0 times
Johnetta
8 months ago
D) A stream cipher is not appropriate for hardware-based encryption.
upvoted 0 times
...
Jose
8 months ago
I agree, that's the correct statement.
upvoted 0 times
...
Luisa
9 months ago
B) A stream cipher generates what is called a keystream.
upvoted 0 times
...
...
Raymon
10 months ago
D seems like a strange answer. Stream ciphers are actually well-suited for hardware-based encryption, especially in resource-constrained devices.
upvoted 0 times
...
Vincenza
10 months ago
I thought stream ciphers were faster than block ciphers, not slower. Maybe I need to review my crypto basics.
upvoted 0 times
Mona
9 months ago
B) I agree, stream ciphers are designed to be fast and efficient.
upvoted 0 times
...
Mike
10 months ago
A) A stream cipher generates what is called a keystream.
upvoted 0 times
...
...
Ming
10 months ago
I also think B is correct. Stream ciphers are known for generating a keystream.
upvoted 0 times
...
Annice
11 months ago
B is correct. Stream ciphers generate a keystream, which is then XORed with the plaintext to produce the ciphertext.
upvoted 0 times
Fatima
10 months ago
Block ciphers, on the other hand, encrypt data in fixed-size blocks rather than bit by bit like stream ciphers.
upvoted 0 times
...
Lauran
10 months ago
Stream ciphers are known for their speed and efficiency in encrypting data.
upvoted 0 times
...
Charlette
10 months ago
That's right. Stream ciphers are designed to encrypt plaintext bit by bit using a keystream.
upvoted 0 times
...
Javier
10 months ago
B is correct. Stream ciphers generate a keystream, which is then XORed with the plaintext to produce the ciphertext.
upvoted 0 times
...
...
Shawn
11 months ago
I agree with Elke. Stream ciphers do generate a keystream for encryption.
upvoted 0 times
...
Amber
11 months ago
A stream cipher is definitely not a type of asymmetric encryption algorithm. That's just plain wrong.
upvoted 0 times
...
Elke
11 months ago
I think the correct statement is B) A stream cipher generates what is called a keystream.
upvoted 0 times
...

Save Cancel