This seems like a straightforward question about new line injection attacks. I'll need to think carefully about the different ways an attacker could try to inject malicious content into the log file.
Hmm, I'm a bit unsure about this one. The question mentions that the test cases already use a shared library for assertion functions, so option C might not be the best recommendation. I'm leaning more towards option D - implementing standard setup and teardown functions at the test case level.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Cassie
4 months agoLenny
4 months agoMargret
4 months agoBasilia
4 months agoPrincess
5 months agoSkye
5 months agoSanda
5 months agoJohnson
5 months agoCordelia
5 months agoLevi
5 months agoHannah
5 months ago