You create a custom attack signature with the following criteria:
— HTTP Request:
— Pattern: *x<404040…40
— Direction Client to Server
Which client request would be identified as an attack?
A.
FTPGET.,x404040…40
B.
HTTP GET *404040..40
C.
HTPPOST.*x404040…40
D.
HTTP GET *Vx40404CL.40
I choose D