Which of the following attacks allows an attacker to access restricted directories, including application source code, configuration and critical system files, and to execute commands outside of the web server’s root directory?

Posted by: Pdfprep Category: 312-49v9 Tags: , ,

Which of the following attacks allows an attacker to access restricted directories, including application source code, configuration and critical system files, and to execute commands outside of the web server’s root directory?
A . Unvalidated input
B . Parameter/form tampering
C . Directory traversal
D . Security misconfiguration

Answer: C

Leave a Reply

Your email address will not be published.