A security engineer obtained the following output from a threat intelligence source that recently performed an attack on the company's server:
Which of the following BEST describes this kind of attack?
A. Directory traversal
B. SQL injection
C. API
D. Request forgery