GIAC Certified Enterprise Defender GCED Question # 25 Topic 3 Discussion

GIAC Certified Enterprise Defender GCED Question # 25 Topic 3 Discussion

GCED Exam Topic 3 Question 25 Discussion:
Question #: 25
Topic #: 3

Which of the following attacks would use “..” notation as part of a web request to access restricted files and directories, and possibly execute code on the web server?


A.

URL directory


B.

HTTP header attack


C.

SQL injection


D.

IDS evasion


E.

Cross site scripting


Get Premium GCED Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.