New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 SSCP Exam - Topic 8 Question 65 Discussion

Actual exam question for ISC2's SSCP exam
Question #: 65
Topic #: 8
[All SSCP Questions]

Which of the following protects Kerberos against replay attacks?

Show Suggested Answer Hide Answer
Suggested Answer: A

XSS or Cross-Site Scripting is a threat to web applications where malicious code is placed on a website that attacks the use using their existing authenticated session status.

Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted web sites. Cross-site scripting (XSS) attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user in the output it generates without validating or encoding it.

An attacker can use XSS to send a malicious script to an unsuspecting user. The end user's browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by your browser and used with that site. These scripts can even rewrite the content of the HTML page.

Mitigation:

Configure your IPS - Intrusion Prevention System to detect and suppress this traffic.

Input Validation on the web application to normalize inputted data.

Set web apps to bind session cookies to the IP Address of the legitimate user and only permit that IP Address to use that cookie.

See the XSS (Cross Site Scripting) Prevention Cheat Sheet

See the Abridged XSS Prevention Cheat Sheet

See the DOM based XSS Prevention Cheat Sheet

See the OWASP Development Guide article on Phishing.

See the OWASP Development Guide article on Data Validation.

The following answers are incorrect:

Intrusion Detection Systems: Sorry. IDS Systems aren't usually the target of XSS attacks but a properly-configured IDS/IPS can 'detect and report on malicious string and suppress the TCP connection in an attempt to mitigate the threat.

Firewalls: Sorry. Firewalls aren't usually the target of XSS attacks.

DNS Servers: Same as above, DNS Servers aren't usually targeted in XSS attacks but they play a key role in the domain name resolution in the XSS attack process.

The following reference(s) was used to create this question:

CCCure Holistic Security+ CBT and Curriculum

and

https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29


Contribute your Thoughts:

0/2000 characters
Lisbeth
4 months ago
Passwords don’t help with replay attacks, just saying.
upvoted 0 times
...
Katy
4 months ago
Wait, are we sure it's not tokens? Seems sketchy.
upvoted 0 times
...
Lore
4 months ago
Totally agree, time stamps are key!
upvoted 0 times
...
Adolph
4 months ago
I thought it was cryptography that did that?
upvoted 0 times
...
Rozella
4 months ago
It's definitely time stamps that protect against replay attacks.
upvoted 0 times
...
Mireya
5 months ago
I definitely remember time stamps being mentioned in relation to replay attacks, so I think that might be the right answer.
upvoted 0 times
...
Jacob
5 months ago
I feel like cryptography plays a role in securing Kerberos, but I don't know if it's the main defense against replay attacks.
upvoted 0 times
...
Mollie
5 months ago
I remember studying that Kerberos uses tokens, but I can't recall if they specifically prevent replay attacks.
upvoted 0 times
...
Sina
5 months ago
I think it's time stamps that protect against replay attacks, but I'm not completely sure.
upvoted 0 times
...
Catina
5 months ago
I'm a bit confused by the wording here. I'll need to re-read the question and options carefully to make sure I understand what they're asking.
upvoted 0 times
...
Cecilia
5 months ago
This seems like a pretty straightforward question. I'm going to go with option A - your customer's accent could definitely be a barrier to communication in the Service Desk.
upvoted 0 times
...
Ashlyn
5 months ago
Wait, I think there's one more option here that I'm forgetting. Let me re-read the question and the choices again to make sure I don't miss anything.
upvoted 0 times
...
Janine
5 months ago
This seems like a straightforward question about the tools used in a site survey. I'm pretty confident I can figure this out.
upvoted 0 times
...
Estrella
5 months ago
I've seen similar exploits before, so I think I have a good idea of what this one might do. I'll go with my best guess and see how it turns out.
upvoted 0 times
...
Margot
9 months ago
Oh, this is a tough one. I'm going to have to consult my crystal ball to figure out the right answer. Maybe I'll just guess and hope for the best.
upvoted 0 times
...
Jarvis
9 months ago
I bet the answer is E) Unicorn tears. Everybody knows Kerberos is powered by the magical essence of mythical creatures.
upvoted 0 times
...
Rodrigo
9 months ago
B) Passwords? Really? That's like the worst way to protect against replay attacks. Might as well just write your password on a sticky note and stick it to your monitor.
upvoted 0 times
Remedios
8 months ago
B) Passwords are not the most secure option for protecting against replay attacks.
upvoted 0 times
...
Casandra
8 months ago
D) Time stamps can be used to prevent replay attacks as well.
upvoted 0 times
...
Corinne
9 months ago
C) Cryptography is also a strong defense against replay attacks.
upvoted 0 times
...
Michal
9 months ago
A) Tokens are actually the best way to protect against replay attacks.
upvoted 0 times
...
...
Elise
10 months ago
Hmm, I'm going to have to go with A) Tokens. Kerberos issues tickets that act as tokens, and those tokens can't be reused, so it's gotta be the right answer, right?
upvoted 0 times
Jess
9 months ago
Yes, tokens issued by Kerberos help prevent replay attacks.
upvoted 0 times
...
Lenna
9 months ago
I agree, Kerberos uses tokens to protect against replay attacks.
upvoted 0 times
...
Verlene
9 months ago
I think you're right, A) Tokens are used to prevent replay attacks.
upvoted 0 times
...
...
Kindra
10 months ago
I'm going with C) Cryptography. Kerberos uses encryption to protect the integrity of the communication, which helps prevent replay attacks. Simple as that.
upvoted 0 times
Val
9 months ago
I think A) Tokens can also help protect against replay attacks by providing a unique identifier for each message exchanged.
upvoted 0 times
...
Roy
9 months ago
D) Time stamps also play a role in protecting against replay attacks. They help ensure that messages are not reused after a certain period of time.
upvoted 0 times
...
Leota
9 months ago
I agree, C) Cryptography is the correct answer. It ensures that the messages exchanged between parties are secure.
upvoted 0 times
...
...
Denae
10 months ago
D) Time stamps, of course! Kerberos uses timestamps to ensure that requests aren't being replayed. Duh, everyone knows that!
upvoted 0 times
...
Adelina
11 months ago
I'm not sure, but I think C) Cryptography could also protect against replay attacks by encrypting the data.
upvoted 0 times
...
Shaunna
11 months ago
I agree with Alba. Time stamps prevent replay attacks by ensuring each request is unique.
upvoted 0 times
...
Alba
11 months ago
I think the answer is D) Time stamps.
upvoted 0 times
...

Save Cancel