Which of the following log injection attacks uses white space padding to create unusual log entries?
A . Word wrap abuse attack
B . HTML injection attack
C . Terminal injection attack
D . Timestamp injection attack
Answer: A
Which of the following log injection attacks uses white space padding to create unusual log entries?
A . Word wrap abuse attack
B . HTML injection attack
C . Terminal injection attack
D . Timestamp injection attack
Answer: A