A security engineer is reviewing log data and sees the output below:
POST: /payload.php HTTP/1.1
HOST: localhost
Accept: */*
Referrer: http://localhost/
*******
HTTP/1.1 403 Forbidden
Connection: close
Log: Access denied with 403. Pattern matches form bypass
Which of the following technologies was MOST likely being used to generate this log?
A.
Host-based Intrusion Detection System
B.
Web application firewall
C.
Network-based Intrusion Detection System
D.
Stateful Inspection Firewall
E.
URL Content Filter