ECCouncil 312-49v11 Question Answer
An organization with a web application was compromised, and the attacker was able to download the entire database. During the initial review of the logs, the forensic investigator found several instances of the following string ' %2c%2c%2f’. What type of attack could have led to this breach?

