1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hichkok12 [17]
2 years ago
13

In response to an alert regarding a possible security incident, you are analyzing the logs for a web application. In the process

, you see the following string: ./../../../var/secrets What type of attack was most likely attempted against the application
Computers and Technology
1 answer:
SOVA2 [1]2 years ago
4 0

The type of attack was most likely attempted against the application is an  XSS attack.

<h3>Why is the above an  XSS attack?</h3>

This attack is known to be an example of an XSS attack as it is one that is often recorded by the log of a web server's log.

Conclusively, Note that in this attack, if you see the HTML encoding, one can say that is mainly an XSS attack but when you see SQL or XML statements in the string, then it is another.

Learn more about attack from

brainly.com/question/76529

#SPJ1

You might be interested in
What is considered necessary to establish OSHA
irakobra [83]
OSHA (the Occupational Safety and Health Administration) is a part of the US Department of Labor that establishes, issues, and enforces national workplace safety regulatio…ns. These are designed to make job areas and practices safer for US workers.
4 0
4 years ago
What mistake might you make related to changing the data in a cell that's used in a formula?
scoundrel [369]

Answer:

ojalat sirve

Explanation:

Cuando en una fórmula, en vez de indicar una celda, fila o columna estamos enlazando una hoja de cálculo o libro, debemos hacerlo con comilla simple. Si empleamos otro signo o símbolo separador, la fórmula no entenderá correctamente lo que le estamos indicando.

6 0
3 years ago
Which best describes what databases do?
quester [9]

Answer:

They create categories for data.

Explanation:

They can create categories for data, by storing the data. Information itself can be stored in multiple ways, like creating categories!

I hope this helped :)

6 0
3 years ago
Read 2 more answers
Which type of address is the ip address 232. 111. 255. 250?.
svp [43]
I think it’s a multicast
8 0
2 years ago
The __is the temporary storange location for text when it is cut from a document
enot [183]
The informal answer to your question is "clipboard". However, there isn't such a thing as the "clipboard". The people who came up with the idea of the clipboard use that nomenclature to describe the location in memory where that copied data resides. So the formal answer to your question is memory or RAM.
3 0
3 years ago
Other questions:
  • How do type declaration statements for simple variables affect the readability of a language, considering that some languages do
    10·1 answer
  • Driving is expensive. Write a program with a car's miles/gallon and gas dollars/gallon (both doubles) as input, and output the g
    7·2 answers
  • How do you get 99 points on sunny meadows simulation?
    6·2 answers
  • In this question, you must create a function in C++ using an external editor. When satisfied with your work, you shall attach it
    10·1 answer
  • Please help! Answer this question if you know computer science very well. I need help with computer science.
    13·1 answer
  • The number of individual networking address required for the internet is
    9·1 answer
  • Discuss how sentiment analysis works using big data?<br>​
    13·1 answer
  • Write the two features of a mouse.​
    9·1 answer
  • What feature is available to add a auggestion in the margin of someone else's document.
    11·1 answer
  • A binary search algorithm ____________ an ordered list in<br> half to find an item.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!