In which of the following attack types does an attacker exploit vulnerabilities that evolve from the unsafe use of functions in an application in public web servers to send crafted requests to internal or backend servers?

A. SSH brute forcing
B. Web-server password cracking
C. Server-side request forgery
D. Web-server misconfiguration


Answer: C. Server-side request forgery

Sociology

You might also like to view...

Textbooks used in public schools have typically provided an accurate account of history

a. true b. false

Sociology

Day labor is a term that refers to employees who work for an employer as temporaries or as independent contractors

a. true b. false

Sociology

____________ of blood plasma is produced by men.

- 260 to 1,000 ng/dL - 80 to 100 ng/dL - 15 to 70 ng/dL - 200 to 500 ng/dL

Sociology

“Institutions must be held accountable for fulfilling human rights and for violating those rights.” This statement is describing ______.

a. empowerment b. rule of law c. universality d. indivisibility

Sociology