1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rasek [7]
2 years ago
6

Which attack occurs when the attacker is able to browse for directories and files outside the normal application access?

Social Studies
1 answer:
Damm [24]2 years ago
4 0

Directory traversal.

Directory traversal (path traversal) happens when the attacker is in a position to read files on the online server outside of the directory of the website. Properly controlling access to an online page is crucial for running a secure web server. Directory traversal or Path Traversal is an HTTP attack that enables attackers to access restricted directories and execute commands outside of the online server’s root directory.

With a system at risk of directory traversal, an attacker can make use of this vulnerability to get out of the foundation directory and access other parts of the classification system. This might give the attacker the power to look at restricted files, which could provide the attacker with more information required to further compromise the system.

Therefore it all depends on what the website user has been given access to within the system. Apart from vulnerabilities within the code, even the net server itself will be receptive to directory traversal attacks. the matter can either be incorporated into the net server software or inside some sample script files left available on the server.  

while you may be employing a web server software version that has fixed this vulnerability, you would possibly still have some sensitive default script directories exposed which are well-known to hackers. The best thanks to check whether your website and web applications are prone to directory traversal attacks are by employing a Web Vulnerability Scanner.

learn more about directories and files: brainly.com/question/20787793

#SPJ4

You might be interested in
Why were the state's unwilling to voluntarily work together in a confederation
Nikolay [14]
The lager and smaller states wanted diffrent things to happen.
8 0
3 years ago
Read 2 more answers
The American Society for Quality defines quality as A. the totality of features and characteristics of a product or service that
m_a_m_a [10]

Answer:

The correct answer is A "the totality of features and characteristics of a product or service that bears on its ability to satisfy stated or implied needs."

Explanation:

The American Society for Quality (ASQ) characterizes quality as:

An emotional term for which every individual or area has its own definition. In specialized use, quality can have two implications:

1. the qualities of an item or administration that bear on its capacity to fulfill expressed or suggested needs;

2. an item or administration liberated from inadequacies.

From the client perspective: quality methods qualification for use and meeting consumer loyalty.

From the procedure perspective: quality methods conformance with the procedure structure, gauges, and particulars.

From the item perspective: quality methods the level of greatness at an adequate cost.

From the cost perspective: quality methods the best blend of expenses and highlights.

3 0
3 years ago
Described hamilton's reasoning for supporting life terms ​
Karo-lina-s [1.5K]

Hamilton wants to become a major political power

<u>EXPLANATION</u><u>:</u>

Hamilton required a different national government that had absolute political power.

He condemned state governments and believed that they should be dismissed entirely. In fact, First, Hamilton says that life securities free judges from administrative stress that comes from the government or official.

This allows judges to guard against communist laws. Anti-federalists considered in a strict version of the US Constitution.

People believed that the middle government should be small and restricted to only the rules expressly provided in the Constitution.

5 0
3 years ago
Answers to the pretest of social studies
zhenek [66]

Answer:

thank you for adding these answers!

5 0
3 years ago
Read 2 more answers
Imperial China was based upon legalism (requiring people to strictly follow the law) and the absolute power of the emperor. This
Nuetrik [128]

The answer is C. the emperor having total control over the lives of the Chinese.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Identify the correctly constructed sentence. although the winter semester has not yet begun has caused the student government to
    10·1 answer
  • How did the size of the Roman Empire change between 150 C.E and 500 C.E ?
    11·1 answer
  • A person who is accused of a crime cannot be convicted if he or she is mentally unstable either at the time of the crime or at t
    15·1 answer
  • I'm pretty sure it is D, but can you check it please? Limited tie to do this, please answer in 5 minutes!!! Which of the followi
    10·2 answers
  • Which approach to research is based on observing people in their own homes or​ communities? A. syndicated B. ethnography C. desc
    7·1 answer
  • ______________ is thinking that makes use of cognitive skills and strategies to increase the likelihood of solving problems, for
    5·1 answer
  • 4. Write a summary, or chronological bullet points, of the early spread of Islam. Include these events: Muhammad’s death, the ca
    6·1 answer
  • Select the correct answer. Which of the following is considered part of a country’s infrastructure? A. Education B. Job opportun
    6·1 answer
  • How did appliances change life in the 1920s?
    9·1 answer
  • TRUE/FALSE. 7. there are behavioral indicators for both children who are abused and those adults who abuse children.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!