electone of the following and discuss in no less than three paragraphs, andhave at least one response to another student of at least one paragraph: Imaginethat a systems administrator for a midsized company has recentlynoticed numerous odd characters in the log servers. Specifically, http“GET” and “POST” log entries within their externally facing IIS version 5web server. Discuss the use of the “GET” and “POST” commands and decidewhether or not there are concerns with their presence on the externallyfacing web server. Next, provide your analysis of the most damagingattack (i.e. XSS, SQL Injection, CSS, and Race conditions) againstInternet Information Services (IIS). Support your rationale. Describethe most prominent signs that a database attack has occurred. Suggestthe main steps that one would take to recover from such an attack. Next,propose one strategy you would use to prevent such attacks. Any current topic or article related to penetration techniques.
100% Original paper Customized to your instructions!