the answer is A.File Injection Attacks.
Attackers use scripts to inject malicious files into the server, allowing them to exploit vulnerable parameters and execute malicious code. This kind of attack enables temporary data theft and data manipulation and can provide attackers with persistent control of the server.
Following are different ways to eradicate file injection attacks: o Strongly validate user input. o Consider implementing a chroot jail.
o PHP: Disable allow_url_fopen and allow_url_include in php.ini
o PHP: Disable register_globals and use E_STRICT to find uninitialized variables.
o PHP: Ensure that all file and streams functions (stream_*) are carefully vetted.
The correct Answer is A. File Injection Attacks
Official EC-Council Courseware, Volume 2, pg. 815
upvoted 2 times
...
This section is not available anymore. Please use the main Exam Page.312-39 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Man_San
1 year, 1 month agosis_net_sec
1 year, 1 month agoSchFiftySchFive
1 year, 4 months ago