List of questions
Related questions
Question 211 - CV0-004 discussion
An organization's critical data was exfiltrated from a computer system in a cyberattack. A cloud analyst wants to identify the root cause and is reviewing the following security logs of a software web application:
'2021/12/18 09:33:12' '10. 34. 32.18' '104. 224. 123. 119' 'POST / login.php?u=administrator&p=or%201%20=1'
'2021/12/18 09:33:13' '10.34. 32.18' '104. 224. 123.119' 'POST /login. php?u=administrator&p=%27%0A'
'2021/12/18 09:33:14' '10. 34. 32.18' '104. 224. 123. 119' 'POST /login. php?u=administrator&p=%26'
'2021/12/18 09:33:17' '10.34. 32.18' '104. 224. 123.119' 'POST / login.php?u=administrator&p=%3B'
'2021/12/18 09:33:12' '10.34. 32. 18' '104. 224. 123. 119' 'POST / login. php?u=admin&p=or%201%20=1'
'2021/12/18 09:33:19' '10.34.32.18' '104. 224. 123.119' 'POST / login. php?u=admin&p=%27%0A'
'2021/12/18 09:33:21' '10. 34. 32.18' '104.224. 123.119' 'POST / login. php?u=admin&p=%26'
'2021/12/18 09:33:23' '10. 34. 32.18' '104. 224. 123.119' 'POST / login. php?u=admin&p=%3B'
Which of the following types of attacks occurred?
0 comments
Leave a comment first