A security engineer is reviewing log data and sees the output below:

A security engineer is reviewing log data and sees the output below:

POST: /payload.php HTTP/1.1
HOST: localhost
Accept: /
Referrer: http://localhost/
*******
HTTP/1.1 403 Forbidden
Connection: close
Log: Access denied with 403. Pattern matches form bypass Which of the following technologies was MOST
likely being used to generate this log?



A. Host-based Intrusion Detection System
B. Web application firewall
C. Network-based Intrusion Detection System
D. Stateful Inspection Firewall
E. URL Content Filter


Answer: B


Learn More :