Question 6 of 88Which of the following attacks would use ".." notation as part of a web request to access restricted files and directories, and possibly execute code on the web server? Question 7 of 88At the start of an investigation on a Windows system, the lead handler executes the following commands after inserting a USB drive. What is the purpose of this command? C:\ >dir / s / a dhsra d: \ > a: \ IRCD.txt Question 8 of 88Why might an administrator not be able to delete a file using the Windows del command without specifying additional command line switches? Question 9 of 88Why would the pass action be used in a Snort configuration file? Question 10 of 88On which layer of the OSI Reference Model does the FWSnort utility function?