In which of the following web application threats does an attacker manipulate the variables that reference files with "dot-dot-slash (../)" sequences and its variations?
A. Unvalidated redirects and forwards
B. Hidden field manipulation attack
C. Directory traversal attack
D. Cookie/session poisoning
Answer: C. Directory traversal attack
You might also like to view...
The key to social change in social inequality has been ________
a. proactive government intervention b. resistance by subordinate groups c. advocacy by White Americans d. the melting pot philosophy of most Americans
People who undergo sex transformation surgery, lighten their skin to appear to be another race, or hire a plastic surgeon to create a younger appearance remind us that
a. just about anything can be an ascribed status. b. the distinction between ascribed and achieved statuses is not clear cut c. people usually occupy more than one status. d. role and status are related concepts.
Date rapists generally prefer violent encounters
Indicate whether the statement is true or false
The coefficient of reproducibility is used with which scale?
a. Thurstone b. Bogardus social distance c. semantic differential d. Guttman e. Likert