1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
defon
3 years ago
4

What type of attack involves an attacker accessing files in directories other than the root directory1. sql injection2. command

injection3. xml injection4. directory traversal
Computers and Technology
2 answers:
anzhelika [568]3 years ago
7 0

Answer:

Directory traversal

Explanation:

SQL injection is a hacking technique used to attack SQL (Structured Query Language) database, in which malicious SQL statements are inserted into an entry field in other to gain access to unauthorized information or make alteration to important data, thus option 1 is not the answer

Command injection is an attack in which an hacker execute arbitrary commands on a server, thus option 2 is wrong.

XML injection is an attack in which the hacker seek to inject xml tags and data into a database so as to exploit the logic of the application, option 3 is also wrong.

Directory traversal also known Path Traversal is a web attack in which the attacker access files in directories other than the root directory. thus option 4 is correct.

galina1969 [7]3 years ago
3 0

Answer:

Directory traversal

Explanation:

Directory traversal a HTTP attack which allows that helps an intruder to access arbitrary files on the server running an application or access restricted directories and run commands outside of the root directory. This attack is aimed at using an infected program to obtain unauthorized access to the filesystem. This attack makes use of flaw in the security instead of leveraging the flaw in the application. Through directory traversal, an attacker is able to attack data, program, sensitive OS files, by writing to files on the server or modifying application data, consequently, taking control of the server.

 

 

You might be interested in
A data table is a range that displays what?
shutvik [7]

Answer:

D. The results of changing certain values in one or more formulas

Explanation:

On edge

8 0
3 years ago
Read 2 more answers
Explain how data is represent in the computer system
Alex Ar [27]

Explanation:

<h3>Computers use binary - the digits 0 and 1 - to store data. A binary digit, or bit, is the smallest unit of data in computing. It is represented by a 0 or a 1. Binary numbers are made up of binary digits (bits), eg the binary number 1001.</h3>

7 0
3 years ago
Which display technology was developed by apple, produces vibrant colors, and supports viewing from all angles?
Vedmedyk [2.9K]
4.5K Retina display I think that is the answer you’re looking for
3 0
2 years ago
) A byte is used to represent a single character in the computer ______<br> true or false?
sdas [7]
Answer: false
Explanation:
7 0
3 years ago
Read 2 more answers
HELP WILL MARK BRAINLIEST!!!!!!!!!!!!!!!!!<br> How do you take a screenshot on Windows 7?
Alina [70]
U can see the printscr botton at the top right of ur keyboard and then u can type paint and the control v. 
3 0
4 years ago
Read 2 more answers
Other questions:
  • Assume that a program consists of integer and floating-point instructions. 60% of the total execution time is spent on floating
    7·1 answer
  • A game’s ______ is what contains its directions and calculations; some refer to it as the “engine” that drives the game.
    12·1 answer
  • Which would be a responsible use of technology used by victims of cyberbullying? finding ways to strike back at bullies online.
    15·1 answer
  • What online resource name does a major University end with
    7·2 answers
  • Consider the following methods:
    10·1 answer
  • The use of _______________ can validate input responses from clients and prevent certain attack methodologies
    14·1 answer
  • Which type of system requires a regular backup of files
    10·2 answers
  • How to interchange first half of the array with second half of array in python?
    9·1 answer
  • Why is it important to consider the clients temperature before doing the foot spa services?​
    13·1 answer
  • How to create create a database in mysql using clv files
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!