Which of the following BEST describes a directory traversal attack?
A.
A malicious user can insert a known pattern of symbols in a URL to access a file in another
section of the directory.
B.
A malicious user can change permissions or lock out user access from a webroot directory or
subdirectories.
C.
A malicious user can delete a file or directory in the webroot directory or subdirectories.
D.
A malicious user can redirect a user to another website across the Internet.