A security analyst is reviewing SIEM logs during an ongoing attack and notices the following:

Which of the following best describes the type of attack?
A. SQLi
B. CSRF
C. API attacks
D. Directory traversal

Which of the following best describes the type of attack?
A. SQLi
B. CSRF
C. API attacks
D. Directory traversal