1. Which of the following is used to disable file extensions in Apache servers?
2. You are examining connection logs from a client machine and come across this entry:
Which attack does this most likely indicate?
A. Parameter manipulation
C. SQL injection
D. Directory traversal
3. A hacker is looking at a publicly facing web front end. One of the pages provides an entry box with the heading “Forgot password? Enter your e-mail address.” In the entry, he types anything’ OR ‘1’=’1.
A message appears stating “Your login ...