This seems like a straightforward question about new line injection attacks. I'll need to think carefully about the different ways an attacker could try to inject malicious content into the log file.
Hmm, I'm a bit unsure about this one. The question mentions that the test cases already use a shared library for assertion functions, so option C might not be the best recommendation. I'm leaning more towards option D - implementing standard setup and teardown functions at the test case level.
upvoted 0
times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Cassie
6 months agoLenny
6 months agoMargret
6 months agoBasilia
6 months agoPrincess
6 months agoSkye
6 months agoSanda
6 months agoJohnson
6 months agoCordelia
7 months agoLevi
7 months agoHannah
7 months ago