ECCouncil Exam Questions

Which of the following log injection attacks uses white space padding to create unusual log entries?

Which of the following log injection attacks uses white space padding to create unusual log
entries?

A.
Word wrap abuse attack

B.
HTML injection attack

C.
Terminal injection attack

D.
Timestamp injection attack