The following IDS log was discovered by a companyâ’s cybersecurity analyst:
Which of the following was launched against the company based on the IDS log?
A. SQL injection attack
B. Cross-site scripting attack
C. Buffer overflow attack
D. Online password crack attack