Your co-worker has called you in the middle of the night to report all the servers have

Question:

Your co-worker has called you in the middle of the night to report all the servers have been compromised and have run out of memory. After some debugging, it seems like the attacker exploited a file upload resource, but you aren’t sure how since the endpoint has a small maximum file size limit. What is the most likely type of attack perpetrated against the system? 

A. Denial of service attack

B. Inclusion attack

C. Distributed denial of service attack

D. Exploit attack

E. SQL injection

F. Injection attack.

Fantastic news! We've Found the answer you've been seeking!

Step by Step Answer:

Question Posted: