In which of the following attack types does an attacker exploit vulnerabilities that evolve from the unsafe use of functions in an application in public web servers to send crafted requests to internal or backend servers?
A. SSH brute forcing
B. Web-server password cracking
C. Server-side request forgery
D. Web-server misconfiguration
Answer: C. Server-side request forgery
Sociology
You might also like to view...
Textbooks used in public schools have typically provided an accurate account of history
a. true b. false
Sociology
Day labor is a term that refers to employees who work for an employer as temporaries or as independent contractors
a. true b. false
Sociology
____________ of blood plasma is produced by men.
- 260 to 1,000 ng/dL - 80 to 100 ng/dL - 15 to 70 ng/dL - 200 to 500 ng/dL
Sociology
“Institutions must be held accountable for fulfilling human rights and for violating those rights.” This statement is describing ______.
a. empowerment b. rule of law c. universality d. indivisibility
Sociology