(ISC)2 Certified in Cybersecurity Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the (ISC)2 Certified in Cybersecurity Exam with comprehensive quizzes and extensive question banks. Enhance your skills with detailed explanations and practice tests designed to improve your expertise for the certification exam. Get exam-ready now!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What type of attack attempts to exploit web applications by injecting malicious script into web pages?

  1. SQL Injections

  2. XSS

  3. Fault Injection Attacks

  4. Worms

The correct answer is: XSS

The type of attack that attempts to exploit web applications by injecting malicious scripts into web pages is known as Cross-Site Scripting (XSS). In XSS attacks, an attacker exploits vulnerabilities in a web application by inserting malicious client-side scripts into content that is then served to users. This allows the attacker to execute these scripts in the context of the user's browser, leading to a variety of malicious outcomes, such as stealing session cookies, logging keystrokes, or redirecting users to malicious sites. The nature of XSS allows attackers to bypass the same-origin policy of web browsers, making it particularly dangerous since it can lead to unauthorized actions taken on behalf of users without their consent. The impact of XSS can be severe, often resulting in compromised user accounts, data theft, and degradation of trust in the targeted web application. Other types of attacks listed, such as SQL injections, primarily target the back-end database of an application rather than injecting scripts into web pages. Fault Injection Attacks exploit vulnerabilities in the functioning of applications through error handling rather than through script injection. Worms are malware that replicate themselves and spread across networks but do not typically exploit web applications through script injection. This context helps solidify the understanding of why Cross-Site Scripting