A network administrator who manages a Linux web server notices the following traffic:
http://comptia.org/../../../../etc/shadow
Which of the following is the BEST action for the network administrator to take to defend against this type of web attack?
CXSSP
Highly Voted 1 year, 8 months agob49eb27
1 year, 1 month agosaucehozz
1 year agof7bc9da
Most Recent 2 weeks, 4 days agoEAlonso
10 months, 2 weeks agob49eb27
1 year, 1 month ago