1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hichkok12 [17]
2 years ago
13

In response to an alert regarding a possible security incident, you are analyzing the logs for a web application. In the process

, you see the following string: ./../../../var/secrets What type of attack was most likely attempted against the application
Computers and Technology
1 answer:
SOVA2 [1]2 years ago
4 0

The type of attack was most likely attempted against the application is an  XSS attack.

<h3>Why is the above an  XSS attack?</h3>

This attack is known to be an example of an XSS attack as it is one that is often recorded by the log of a web server's log.

Conclusively, Note that in this attack, if you see the HTML encoding, one can say that is mainly an XSS attack but when you see SQL or XML statements in the string, then it is another.

Learn more about attack from

brainly.com/question/76529

#SPJ1

You might be interested in
Answer this crossword for brainliest and 15 points
nordsb [41]

Answer:

I like ur cut G

Explanation:

6 0
3 years ago
Video- sharing sites allow videos to be uploaded in which file format?
ziro4ka [17]

Question

video- sharing sites allow videos to be uploaded in which file format?

the correct answer is .avi?


Yes it is .avi, because the other extension are not video.


8 0
3 years ago
Read 2 more answers
Which option represents the location of the Data Table function?
hichkok12 [17]

Answer:A

Explanation:

8 0
3 years ago
Which network component blocks status?
SIZIF [17.4K]

Answer:

Router

Explanation:

It will reads the data packet's destination address .

Looks up all the paths it has available to get to that address.

7 0
3 years ago
Juhfvehrfwhedfhwkefhkujhiuyuiyuiyiyh
maw [93]

Answer:

blah

blah

blah..⁉️

Explanation:

juhfvehrfwhedfhwkefhkujhiuyuiyuiyiyh

⁉️

8 0
3 years ago
Other questions:
  • You're trying to decide which disk technology to use on your new server. the server will be in heavy use around the clock every
    10·1 answer
  • I have one big question <br><br><br> WHAT CAN I DO WHEN I'M BORED
    6·2 answers
  • Which protocol would you utilize to upload files to a web server?
    14·1 answer
  • The __________ contains a list of all the resources owned by the library.
    7·1 answer
  • Why is it important for people to express resentments in the workplace?
    9·1 answer
  • explain the following with regard to a microcomputer. 1)program 2)stored program concept 3)instruction decoder
    5·1 answer
  • Which of the following is a software application program?
    12·1 answer
  • Which statements accurately describe the Bookmark feature in the Audio/Video control bar? Check all that apply.
    13·1 answer
  • Requirements description:
    6·1 answer
  • Technological advancements during the industrial age provided Americans with:
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!