A security analyst is reviewing IDS logs and notices the following entry:
Which of the following attacks is occurring?
A . Cross-site scripting
B . Header manipulation
C . SQL injection
D . XML injection
Answer: C
A security analyst is reviewing IDS logs and notices the following entry:
Which of the following attacks is occurring?
A . Cross-site scripting
B . Header manipulation
C . SQL injection
D . XML injection
Answer: C