New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

ISC2 SSCP Exam - Topic 8 Question 67 Discussion

Actual exam question for ISC2's SSCP exam
Question #: 67
Topic #: 8
[All SSCP Questions]

Which of the following tasks is NOT usually part of a Business Impact Analysis (BIA)?

Show Suggested Answer Hide Answer
Suggested Answer: A

XSS or Cross-Site Scripting is a threat to web applications where malicious code is placed on a website that attacks the use using their existing authenticated session status.

Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted web sites. Cross-site scripting (XSS) attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user in the output it generates without validating or encoding it.

An attacker can use XSS to send a malicious script to an unsuspecting user. The end user's browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by your browser and used with that site. These scripts can even rewrite the content of the HTML page.

Mitigation:

Configure your IPS - Intrusion Prevention System to detect and suppress this traffic.

Input Validation on the web application to normalize inputted data.

Set web apps to bind session cookies to the IP Address of the legitimate user and only permit that IP Address to use that cookie.

See the XSS (Cross Site Scripting) Prevention Cheat Sheet

See the Abridged XSS Prevention Cheat Sheet

See the DOM based XSS Prevention Cheat Sheet

See the OWASP Development Guide article on Phishing.

See the OWASP Development Guide article on Data Validation.

The following answers are incorrect:

Intrusion Detection Systems: Sorry. IDS Systems aren't usually the target of XSS attacks but a properly-configured IDS/IPS can 'detect and report on malicious string and suppress the TCP connection in an attempt to mitigate the threat.

Firewalls: Sorry. Firewalls aren't usually the target of XSS attacks.

DNS Servers: Same as above, DNS Servers aren't usually targeted in XSS attacks but they play a key role in the domain name resolution in the XSS attack process.

The following reference(s) was used to create this question:

CCCure Holistic Security+ CBT and Curriculum

and

https://www.owasp.org/index.php/Cross-site_Scripting_%28XSS%29


Contribute your Thoughts:

0/2000 characters
Alyce
4 months ago
I thought mission statements were important for businesses though.
upvoted 0 times
...
Edward
4 months ago
A and C are definitely part of it, but D? Nope!
upvoted 0 times
...
Alverta
4 months ago
Wait, developing a mission statement isn’t part of it? That’s surprising!
upvoted 0 times
...
Jody
4 months ago
Totally agree, D is not part of BIA.
upvoted 0 times
...
Rene
4 months ago
BIA usually focuses on critical functions, not mission statements.
upvoted 0 times
...
Ora
5 months ago
I’m a bit confused, but I think calculating how long functions can survive is part of BIA, which makes me lean towards A or D as the answer.
upvoted 0 times
...
Marguerita
5 months ago
I practiced a similar question, and I feel like developing a mission statement isn’t really part of a BIA, so I’d go with D.
upvoted 0 times
...
Tommy
5 months ago
I’m not entirely sure, but I remember something about calculating risks being part of BIA, so maybe A is also not correct?
upvoted 0 times
...
Jerry
5 months ago
I think BIA usually focuses on identifying critical functions, so maybe D is the odd one out since it’s about a mission statement?
upvoted 0 times
...
Marlon
5 months ago
Okay, I've got this. The key is to extend the BootstrapConfigurer class. That will allow me to hook into the startup process and trigger the synchronization of users and groups from the custom identity provider.
upvoted 0 times
...
Lezlie
5 months ago
I've got this! First, save your changes, then compile the Flex field structure, and finally freeze the definition. Easy peasy.
upvoted 0 times
...
Evan
5 months ago
I'm pretty sure Outbound Email is a trigger type, so that's not the answer.
upvoted 0 times
...
Janey
5 months ago
I'm a bit confused; I thought "net trading" meant something else. Is that the same as what we're discussing here?
upvoted 0 times
...
Audrie
5 months ago
Hmm, I'm a bit unsure about this one. I think Media Buying is definitely part of a media plan, but I'm not sure about the other options. I'll have to think this through carefully.
upvoted 0 times
...
Virgina
5 months ago
I'm a little unsure about this one. The network setup and problem description seem complex, and I want to make sure I don't overlook any important details. I'll take my time, review the options thoroughly, and try to apply my knowledge of routing protocols and network troubleshooting to find the best solution.
upvoted 0 times
...
Angella
10 months ago
Definitely D. A mission statement is for the boardroom, not the server room. Although I do wonder if the CEO ever reads those things...
upvoted 0 times
...
Jennie
10 months ago
Haha, I bet the exam writer was trying to trip us up with that mission statement option. As if any self-respecting IT professional would confuse that with a BIA!
upvoted 0 times
Norah
9 months ago
C) Calculate how long these functions can survive without these resources.
upvoted 0 times
...
Selma
9 months ago
B) Identify the company's critical business functions.
upvoted 0 times
...
Rosio
9 months ago
A) Calculate the risk for each different business function.
upvoted 0 times
...
...
Malcolm
10 months ago
Hmm, I think option D is the odd one out here. Developing a mission statement is more of a high-level business activity, not part of the technical analysis.
upvoted 0 times
Donette
8 months ago
D) Develop a mission statement.
upvoted 0 times
...
Edda
8 months ago
C) Calculate how long these functions can survive without these resources.
upvoted 0 times
...
Arlene
8 months ago
B) Identify the company's critical business functions.
upvoted 0 times
...
Malcolm
8 months ago
A) Calculate the risk for each different business function.
upvoted 0 times
...
Val
9 months ago
D) Develop a mission statement.
upvoted 0 times
...
Selma
9 months ago
C) Calculate how long these functions can survive without these resources.
upvoted 0 times
...
Mickie
10 months ago
B) Identify the company's critical business functions.
upvoted 0 times
...
Troy
10 months ago
A) Calculate the risk for each different business function.
upvoted 0 times
...
...
Jonelle
11 months ago
I'm pretty sure the mission statement is not part of a BIA. That's more for the overall business strategy, not the technical recovery plan.
upvoted 0 times
Corazon
9 months ago
B) Identify the company's critical business functions.
upvoted 0 times
...
Carlton
9 months ago
A) Calculate the risk for each different business function.
upvoted 0 times
...
...
Donte
11 months ago
But developing a mission statement is not really part of analyzing the impact on business operations.
upvoted 0 times
...
Adelina
11 months ago
I disagree, I believe the answer is A) Calculate the risk for each different business function.
upvoted 0 times
...
Donte
11 months ago
I think the answer is D) Develop a mission statement.
upvoted 0 times
...

Save Cancel