Multiple Choice
A security analyst is reviewing the following web server log: GET %2f..%2f..%2f.. %2f.. %2f.. %2f.. %2f../etc/passwd Which of the following BEST describes the issue?
A) Directory traversal exploit
B) Cross-site scripting
C) SQL injection
D) Cross-site request forgery
Correct Answer:

Verified
Correct Answer:
Verified
Q1: A security analyst has discovered that developers
Q2: An analyst is investigating an anomalous event
Q3: Which of the following session management techniques
Q5: Which of the following secure coding techniques
Q6: A security analyst implemented a solution that
Q7: An information security analyst is reviewing backup
Q8: A user receives a potentially malicious email
Q9: A development team uses open-source software and
Q10: A security analyst is building a malware
Q11: A company's incident response team is handling