easymultiple choiceObjective-mapped

A forum lets users save a profile signature. One user enters a string containing script code, and later other users who view that profile see the script run in their browsers. What attack is this?

Question 1easymultiple choice
Full question →

A forum lets users save a profile signature. One user enters a string containing script code, and later other users who view that profile see the script run in their browsers. What attack is this?

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Cross-site scripting

This is cross-site scripting because attacker-supplied script code is stored and then executed when other users view the content. The dangerous part is that the payload is delivered through a trusted website and runs in the victim's browser. Stored XSS is a common issue in profiles, comments, and forums.

B

Distractor review

Command injection

Command injection targets operating system commands on a server, not script execution inside a browser. This scenario describes browser-side code running for other users.

C

Distractor review

CSRF

Cross-site request forgery tricks a logged-in user into performing an action they did not intend. Here, the attack injects active script content instead of forcing a request.

D

Distractor review

Broken authentication

Broken authentication involves weaknesses in login or session handling. The vulnerability here is unsafe input being displayed and executed, not a login flaw.

Common exam trap

Common exam trap: NAT rules depend on direction and matching traffic

NAT is not only about the public address. The inside/outside interface roles and the ACL or rule that matches traffic are just as important.

Technical deep dive

How to think about this question

NAT questions usually test address translation, overload/PAT behaviour, static mappings and whether the right traffic is being translated. Read the interface direction and address terms carefully.

KKey Concepts to Remember

  • Static NAT maps one inside address to one outside address.
  • PAT allows many inside hosts to share one public address using ports.
  • Inside local and inside global describe the private and translated addresses.
  • NAT ACLs identify traffic for translation, not always security filtering.

TExam Day Tips

  • Identify inside and outside interfaces first.
  • Check whether the scenario needs static NAT, dynamic NAT or PAT.
  • Do not confuse NAT matching ACLs with normal packet-filtering intent.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Static NAT maps one inside address to one outside address.

What is the correct answer to this question?

The correct answer is: Cross-site scripting — This is cross-site scripting, specifically stored XSS. The attacker places script code into a field that the application later shows to other users without proper sanitization. Because the code executes in the browser, it can steal data, alter page content, or redirect the user. The key clue is that the payload persists in the profile and affects other viewers. Why others are wrong: Command injection would affect the server's operating system, not the users' browsers. CSRF forces an unwanted action using a valid session, but it does not inject visible script into a page. Broken authentication would involve login or session weaknesses, which are not the issue in this scenario.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.