CompTIA PenTest+ PT0-003 (V3) Practice Question

During a web-application penetration test, a team receives credentials for a staging bug-tracking portal. Testers can create bug tickets that accept rich-text comments and are reflected back to any user who views the ticket. One tester suspects the comment field may be vulnerable to cross-site scripting (XSS) because no client-side filtering is observed in the browser's developer tools. Before documenting the finding, the lead wants concrete proof that any user-supplied text is rendered and executed by the browser at run time.

Which action will MOST effectively confirm exactly how the application processes user-supplied text in the comment field?

  • Review the web application's configuration files for input-filtering or request-validation settings.

  • Apply the latest operating-system patches to the host running the bug-tracking portal.

  • Search the web-server and application logs for entries that contain script tags or unusual HTML.

  • Use an intercepting proxy to inject a JavaScript payload into the comment field and observe the rendered ticket in a browser.

CompTIA PenTest+ PT0-003 (V3)
Engagement Management
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

SAVE $51
$425.00 $374.00
SAVE $57
CompTIA PenTest+ Voucher with Retake
v3 / PT0-003
Includes Retake
$474.00 $417.00
Bash, the Crucial Exams Chat Bot
AI Bot