Question
In the context of Cross-Site Scripting (XSS), what is
the primary reason why stored XSS is considered more dangerous than reflected XSS?Solution
Stored XSS, also known as persistent XSS, is more dangerous because the malicious script is stored permanently on the target server, such as in a database or a message board. When users access the vulnerable page, the script is automatically executed in their browsers without any further user interaction. This allows attackers to exploit a larger number of users, often without their knowledge. In contrast, reflected XSS requires users to interact with a specially crafted link, limiting the scope of the attack. Why Other Options are Incorrect: A) Stored XSS is harder to detect during code review: This is not necessarily true; both types of XSS can be detected through code review with proper attention to input validation. C) Reflected XSS only affects users who directly interact with malicious links: While true, it does not explain why stored XSS is more dangerous. D) Stored XSS bypasses the need for user interaction entirely: This is partially correct but does not fully capture the main reason why stored XSS is more dangerous (automatic execution on page load). E) Stored XSS can directly exploit server vulnerabilities: Stored XSS exploits client-side vulnerabilities rather than directly targeting the server.
In a 5-stage pipeline (Fetch, Decode, Execute, Memory, Write-back), how many instructions can be in various stages of processing at the same time?
A transformer has a primary coil with 300 turns and a secondary coil with 150 turns. If the primary voltage is 240V, calculate the secondary voltage.
Which of the following is a common problem that synchronization mechanisms address in multi-threaded or multi-process environments?
What happens when a program accesses data that is not currently in physical memory (RAM) due to virtual memory management?
Which of the following is not a valid keyword in C++ language?
XML is designed to ____ and ____ data)
What is the main purpose of a digital signature in public key cryptography?
The best case time complexity of selection sort?
What is the space complexity of an algorithm?
Which functions are declared inside a class have to be defined separately outside the class?