Do a bit of research on File Inclusion Vulnerability and answer below questions.
- 1. What is it?
- 2. Why is is dangerous?
- 3. What is the difference of low and remote inclusion?
- 4. What methods can me employed to prevent a security breach?
- 5. What programming languages are vulnerable to this type of attack.
Note: Answer to each of these above questions should be around 75 words.
Write your answer using a WORD document in total about 350 words for all 5 questions. Do your own work and use your own words. Note your Safe Assign score. Score must be less than 25 for full credit.