A security analyst is reviewing the following log entries to identify anomalous activity:
Which of the following attack types is occurring?
A . Directory traversal
B . SQL injection
C . Buffer overflow
D . Cross-site scripting
Answer: A
A security analyst is reviewing the following log entries to identify anomalous activity:
Which of the following attack types is occurring?
A . Directory traversal
B . SQL injection
C . Buffer overflow
D . Cross-site scripting
Answer: A