Scenario: A Citrix Engineer reviews the log files for a business-critical web application. The engineer notices a series of attempts to directly access a file, /etc/passwd.
Which feature can the engineer implement to protect the application against this attack?
Desiree
5 months agoStephane
6 months agoLuke
6 months agoEmelda
6 months agoXuan
6 months agoEmmett
6 months ago