200-201 Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS)
The target web application server is running as the root user and is vulnerable to command injection.
The target web application server is running as the root user and is vulnerable to command injection.
Which result of a successful attack is true?
- A . cross-site scripting
- B . cross-site scripting request forgery
- C . privilege escalation
- D . buffer overflow