While analyzing SIEM alerts for a company ' s WAF, an incident response analyst observes the following:
https://corporate-A.com/loadimage?filename=/etc/
https://corporate-A.com/loadimage?filename=../../etc/passwd
https://corporate-A.com/loadimage?filename=./etc/passwd
Which of the following best describes the observed behavior?
Submit