Attackers can manipulate variables that reference files with “dot-dot-slash (./)” sequences and their
variations such as: http://www.juggyDoy.corn/GET/process.php./././././././././etc/passwd. Identify the
attack referred.
A.
Directory traversal
B.
SQL Injection
C.
XSS attack
D.
File injection