Attackers can manipulate variables that reference files with “dot-dot-slash (./)” sequences and
their variations such as http://www.juggyDoy.corn/GET/process.php./././././././././etc/passwd.
Identify the attack referred.
A.
Directory traversal
B.
SQL Injection
C.
XSS attack
D.
File injection