A security analyst is reviewing the following log entries to identify anomalous activity:
Which of the following attack types is occurring?
Click on the arrows to vote for the correct answer
A.