Scan QR code or get instant email to install app
Question:
Elaine is most likely to find information about whether XML injection attacks are happening against her web applications in the web server logs. Web server logs contain information about the requests and responses made to a web server, including details about the parameters and data exchanged in the requests and responses. By analyzing the web server logs, Elaine can identify patterns of behavior that may indicate a potential XML injection attack, such as unusual or unexpected input values, attempts to exploit known vulnerabilities, or attempts to execute malicious code. Authentication logs may be useful for identifying attempts to bypass authentication controls or brute force attacks, while event logs and syslog may provide information about system-level events and errors, but they are less likely to contain the specific details needed to detect XML injection attacks.
Comments