Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam 312-39 Topic 8 Question 85 Discussion

Actual exam question for Eccouncil's 312-39 exam
Question #: 85
Topic #: 8
[All 312-39 Questions]

John, a SOC analyst, while monitoring and analyzing Apache web server logs, identified an event log matching Regex /(\.|(%|%25)2E)(\.|(%|%25)2E)(\/|(%|%25)2F|\\|(%|%25)5C)/i.

What does this event log indicate?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

Edward
2 days ago
Definitely going with C on this one. The regex pattern is a dead giveaway for a directory traversal attempt. Better lock down those web server logs, John!
upvoted 0 times
...
Dannette
4 days ago
Haha, I bet John was scratching his head trying to figure this one out. Directory traversal attacks can be tricky to spot sometimes.
upvoted 0 times
...
Cristal
6 days ago
I'm not sure, but I think this could also be a parameter tampering attack. The regex pattern seems to be looking for malicious input in the URL parameters.
upvoted 0 times
...
Azalee
12 days ago
This looks like a classic directory traversal attack to me. The regex pattern searches for suspicious directory traversal patterns, so C is the correct answer.
upvoted 0 times
...
Millie
12 days ago
I believe it could also be a Parameter Tampering Attack, as the Regex pattern seems to indicate manipulation of parameters.
upvoted 0 times
...
Karrie
13 days ago
I agree with Freeman, the Regex pattern matches the Directory Traversal Attack.
upvoted 0 times
...
Freeman
25 days ago
I think the event log indicates a Directory Traversal Attack.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77