Which of the following is the most effective way to respond to this attack?

You have determined that the company Web server has several vulnerabilities, including a buffer
overflow that has resulted in an attack. The Web server uses PHP and has direct connections to
an Oracle database server. It also uses many CGI scripts. Which of the following is the most
effective way to respond to this attack?

You have determined that the company Web server has several vulnerabilities, including a buffer
overflow that has resulted in an attack. The Web server uses PHP and has direct connections to
an Oracle database server. It also uses many CGI scripts. Which of the following is the most
effective way to respond to this attack?

A.
Installing software updates for the Web server daemon

B.
Using the POST method instead of the GET method for a Web form

C.
Installing an intrusion detection service to monitor logins

D.
Using the GET method instead of the POST method for a Web form



Leave a Reply 0

Your email address will not be published. Required fields are marked *