answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
defon
2 years ago
4

What type of attack involves an attacker accessing files in directories other than the root directory1. sql injection2. command

injection3. xml injection4. directory traversal
Computers and Technology
2 answers:
anzhelika [568]2 years ago
7 0

Answer:

Directory traversal

Explanation:

SQL injection is a hacking technique used to attack SQL (Structured Query Language) database, in which malicious SQL statements are inserted into an entry field in other to gain access to unauthorized information or make alteration to important data, thus option 1 is not the answer

Command injection is an attack in which an hacker execute arbitrary commands on a server, thus option 2 is wrong.

XML injection is an attack in which the hacker seek to inject xml tags and data into a database so as to exploit the logic of the application, option 3 is also wrong.

Directory traversal also known Path Traversal is a web attack in which the attacker access files in directories other than the root directory. thus option 4 is correct.

galina1969 [7]2 years ago
3 0

Answer:

Directory traversal

Explanation:

Directory traversal a HTTP attack which allows that helps an intruder to access arbitrary files on the server running an application or access restricted directories and run commands outside of the root directory. This attack is aimed at using an infected program to obtain unauthorized access to the filesystem. This attack makes use of flaw in the security instead of leveraging the flaw in the application. Through directory traversal, an attacker is able to attack data, program, sensitive OS files, by writing to files on the server or modifying application data, consequently, taking control of the server.

 

 

You might be interested in
Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log o
Leona [35]

Answer:

b. Enable Secret

Explanation:  Enable secret command is used to enable a secret password for a particular privilege level. It encrypts the desired password for entering the privileged executive mode of a router or switch. This encryption restrains the password from being saved in clear text format in configuration file contrary to enable password which is stored in plain text. Enable secret defines additional layer of security over the  enable password. It is based on MD5 hash algorithm. If both enable secret and enable password commands are configured, then enable secret outranks and overrides the enable password. Internetwork Operating System will only acknowledge the password as configured in the enable secret command. When you set a password using enable secret command, a password set using the enable password  command only works if enable secret is disabled or you are using older version of Cisco IOS software.

5 0
2 years ago
The basic components of cartridges and shotshells are similar. Shot pellets and a bullet are examples of which basic component?
Liono4ka [1.6K]
The answer is projectile. Handguns and rifles use a cartridge having a single projectile or bullet. Shotguns use a shot shell comprising either a single bullet or a big number of small projectiles (shot or pellets). Though, the basic components of cartridges and shot shells are alike.
5 0
2 years ago
Write a split check function that returns the amount that each diner must pay to cover the cost of the meal The function has 4 p
Trava [24]

Answer:

def split_check(bill, people, tax_percentage = 0.09, tip_percentage = 0.15):

   tip = bill * tip_percentage

   tax = bill * tax_percentage

   total = bill + tip + tax

   

   return total / people

bill = float(input())

people = int(input())

print("Cost per diner: " + str(split_check(bill, people)))

bill = float(input())

people = int(input())

new_tax_percentage = float(input())

new_tip_percentage = float(input())

print("Cost per diner: " + str(split_check(bill, people, new_tax_percentage, new_tip_percentage)))

Explanation:

Create a function called split_check that takes four parameters, bill, people, tax_percentage and tip_percentage (last two parameters are optional)

Inside the function, calculate the tip and tax using the percentages. Calculate the total by adding bill, tip and tax. Then, return the result of total divided by the number of people, corresponds to the cost per person.

For the first call of the function, get the bill and people from the user and use the default parameters for the tip_percentage and tax_percentage. Print the result.

For the second call of the function, get the bill, people, new_tip_percentage and new_tax_percentage from the user. Print the result.

7 0
2 years ago
Write a function named max that accepts two integer values as arguments and returns the value that is the greater of the two. Fo
RoseWind [281]

Answer:

The solution code is written in Python

  1. def max(a, b):
  2.    if(a > b):
  3.        return a  
  4.    else:
  5.        return b
  6. num1 = int(input("Please input the first number: "))
  7. num2 = int(input("Please input the second number: "))
  8. print(max(num1, num2))

Explanation:

Firstly create a function max that accepts two input, a and b, as required by question (Line 1). In the function, create if statement to check if a greater than b return a and vice versa (Line 2 -5).

In the main program (Line 7 - 10), prompt user to input two numbers (Line 7 - 8). At last call the function by passing num1 and num2 as arguments and print the result (Line 10).

6 0
2 years ago
In a system where Round Robin is used for CPU scheduling, the following is TRUE when a process cannot finish its computation dur
masha68 [24]

Answer:

B. The process will be terminated by the operating system.

Explanation:

When Round Robin is used for CPU scheduling, a time scheduler which is a component of the operating system is used in regulating the operation. A time limit is set for each of the processes to be run.

So, when a process fails to complete running before its time elapses, the time scheduler would log it off and return it to the queue. This queue is in a circular form and gives each of the processes a chance to run its course.

7 0
2 years ago
Other questions:
  • Donna often travels around the world. When she travels, she needs to access her emails from different locations. However, to kee
    6·2 answers
  • A remediation liaison makes sure all personnel are aware of and comply with an organization's policies.
    9·1 answer
  • Static packet filtering firewalls are limited to ________. inspecting packets for which there are good application proxy filteri
    8·1 answer
  • Explain how buyers and sellers factor into setting the stock price for a company’s shares.
    13·1 answer
  • Describe the Say It, Cover It, Resay It method.
    14·2 answers
  • Write the definition of a function printAttitude, which has an int parameter and returns nothing. The function prints a message
    14·1 answer
  • Sara is using her personal laptop (which is password protected) at a "hotspot" at a local cafe with wifi access. She is in the m
    7·1 answer
  • ___________is used for drawing 3D objects in the field of Science and Engineering.
    12·2 answers
  • Accenture has partnered with a global construction company that specializes in building skyscrapers. The company wants better ma
    12·1 answer
  • What should businesses do in order to remain competitive under the current Cloud<br> landscape?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!