A system with a simple logging mechanism has not been given much attention during
development, this system is now being targeted by attackers, if the attacker wants to perform a
new line injection attack, what will he/she inject into the log file?
A.
Plaintext
B.
Single pipe character
C.
Multiple pipe characters
D.
HTML tags