1. One way to verify if a system is attacked by a brute-force attack is to periodically check the log files. 5. A common path traversal attack uses which syntax sequence to attempt to locate restricted areas on a server? A. --/ B. *.*/ C. CR D. LF 6. During a session fixation attack, in which ways can an attacker obtain a valid session identifier? (Select three.) 9. Which of the following are Web site weaknesses discussed in this chapter? (Select three.) 10. Applications hardening is the process of securing applications in use on a network. 11. To avoid improper input handling, which approaches can you use when handling user input? (Select three.) 12. Which of the following is a strategy for reducing the risk of data leakage?.