Comprehensive CEH Certified Ethical Hacker Practice Exam Collection Designed to Strengthen Skills, Test Knowledge, and Prepare Students for Real Cybersecurity Certification Success. 1. You are examining connection logs from a client machine and comeacross this entry: http://www.business123.com/../../../../../Windows/system.ini. Which attack does this most likely indicate? A. Parameter manipulation B. XSS C. SQL injection D. Directory traversal D. Sure directory traversal is an older attack (working mainly on nowoutdated servers), but its still worth a shot and, more importantly to you dear reader, its going to be on your test. In this attack, the hacker attempts to access restricted directories and execute commands outside intended web server directories. Also known as the known as the dot-dot-slash attack, directory climbing, and backtracking, this attack basically sends HTTP requests asking the server to drop back to the root directory and give access to other folders. Assuming you know the folder directory structure, and the location where you want to run commands and so on, this one is easy enough to pull off. A is incorrect because parameter manipulation (also known as parameter tampering) deals with changing portions of the URL string in hopes of modifyingdata or eliciting a response. An example might be changing