Linux Web サーバーを管理するネットワーク管理者は、次のトラフィックに気づきました。 http://corr.ptia.org/.../.../.../... /etc./shadow この種の Web 攻撃を防御するためにネットワーク管理者がとるべき最善の措置は次のうちどれですか?
正解:B
The network administrator is noticing a web attack that attempts to access the /etc/shadow file on a Linux web server. The /etc/shadow file contains the encrypted passwords of all users on the system and is a common target for attackers. The attack uses a technique called directory traversal, which exploits a vulnerability in the web application that allows an attacker to access files or directories outside of the intended scope by manipulating the file path. Validating the server input and appending the input to the base directory path would be the best action for the network administrator to take to defend against this type of web attack, because it would: * Check the user input for any errors, malicious data, or unexpected values before processing it by the web application. * Prevent directory traversal by ensuring that the user input is always relative to the base directory path of the web application, and not absolute to the root directory of the web server. * Deny access to any files or directories that are not part of the web application's scope or functionality.