Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
What web application vulnerability relies on the ability to embed legitimate content in a third-party iframe?
Cross-Site Request Forgery
Clickjacking
Cross-Site Scripting
SQL Injection
Clickjacking, also known as a "UI redress attack", is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top level page. Thus, the attacker is "hijacking" clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both.
Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker.
** Permit me to ask a more fundamental question. The problem statement as it is given seems more like cross-site scripting than clickjacking. The following URL defines an "iframe," http://www.malware-info.com/malfaqinject.html#Whatisan_iframe?, while the URL https://www.tinfoilsecurity.com/blog/protect-your-website-from-embedded-content-iframe-security discusses both iframes and the vulnerabilities they cause. From these URLs it seems to me that the correct answer should be cross-site scripting. If this is assessment is correct, then please change the answer to cross-site scripting. If not, then a please supply a better answer to the question asked. **
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.