{"id":221,"date":"2020-03-29T09:09:56","date_gmt":"2020-03-29T08:09:56","guid":{"rendered":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/certified-ethical-hacker-312-50v10-question208\/"},"modified":"2020-03-29T09:09:56","modified_gmt":"2020-03-29T08:09:56","slug":"certified-ethical-hacker-312-50v10-question208","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/certified-ethical-hacker-312-50v10-question208\/","title":{"rendered":"Certified Ethical Hacker 312-50v10 &#8211; Question208"},"content":{"rendered":"<div class=\"question\">A company&#039;s Web development team has become aware of a certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application. <\/p>\n<p>What kind of Web application vulnerability likely exists in their software?<br \/>\n<br \/><strong><br \/>A.<\/strong> Cross-site scripting vulnerability <br \/><strong>B.<\/strong> Session management vulnerability <br \/><strong>C.<\/strong> SQL injection vulnerability <br \/><strong>D.<\/strong> Cross-site Request Forgery vulnerability<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>A<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>A company&#039;s Web development team has become aware of a certain type of security vulnerability in their Web software. To mitigate the possibility of this vulnerability being exploited, the team wants to modify the software requirements to disallow users from entering HTML as input into their Web application. What kind of Web application vulnerability likely [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[3,211],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/posts\/221"}],"collection":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/comments?post=221"}],"version-history":[{"count":0,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/posts\/221\/revisions"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/media?parent=221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/categories?post=221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v10\/wp-json\/wp\/v2\/tags?post=221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}