A security analyst is reviewing IDS logs and notices the following entry:
Which of the following attacks is occurring?
A. Cross-site scripting
B. Header manipulation
C. SQL injection
D. XML injection
A security analyst is reviewing IDS logs and notices the following entry:
Which of the following attacks is occurring?
A. Cross-site scripting
B. Header manipulation
C. SQL injection
D. XML injection