ECCouncil Exam Questions

Based on source code analysis, the analyst concludes that the login.php script is vulnerable to&#823

A security administrator notices that the log file of the company`s webserver contains suspicious
entries:

Based on source code analysis, the analyst concludes that the login.php script is vulnerable to

A.
command injection.

B.
SQL injection.

C.
directory traversal.

D.
LDAP injection.