Notifications
Clear all
Topic starter
13/08/2022 9:12 pm
While analyzing logs from a WAF, a cybersecurity analyst finds the following:
Which of the following BEST describes what the analyst has found?
- A . This is an encrypted GET HTTP request
- B . A packet is being used to bypass the WAF
- C . This is an encrypted packet
- D . This is an encoded WAF bypass
Suggested Answer: D