nerdexam
EC-CouncilEC-Council

312-49 · Question #18

312-49 Question #18: Real Exam Question with Answer & Explanation

The correct answer is A: Word wrap abuse attack. A Word Wrap Abuse Attack exploits log viewers and parsers by injecting excessive white space or padding characters to force unusual line breaks or hide malicious entries within log files. This can make log analysis tools misrepresent the data or cause investigators to overlook in

Submitted by jaden.t· Apr 18, 2026Computer Forensics Investigation Process

Question

Which of the following log injection attacks uses white space padding to create unusual log entries?

Options

  • AWord wrap abuse attack
  • BHTML injection attack
  • CTerminal injection attack
  • DTimestamp injection attack

Explanation

A Word Wrap Abuse Attack exploits log viewers and parsers by injecting excessive white space or padding characters to force unusual line breaks or hide malicious entries within log files. This can make log analysis tools misrepresent the data or cause investigators to overlook injected content. HTML injection attacks insert HTML tags into logs, Terminal injection attacks use ANSI escape codes to manipulate terminal-based log viewers, and Timestamp injection attacks forge or manipulate timestamps in log entries — none of these rely specifically on white space padding.

Topics

#Log Injection#Word Wrap Abuse#Attack Techniques

Community Discussion

No community discussion yet for this question.

Full 312-49 PracticeBrowse All 312-49 Questions