An application log shows that the text “test; rm -rf /etc/passwd” was entered into an HTML form.
Which of the following describes the type of attack that was attempted?
A.
Session hijacking
B.
Command injection
C.
Buffer overflow
D.
SQL injection
Explanation: