An organization discovers that some of its proprietary data is for sale on the dark web hacker site. As part of the incident response, a security administratior analyzes application and system log on all Internet-Facing servers. On one wev server, the administration ovserves the folowing text listed repeatedly in POST requests: " or ""="
which type of application attack is MOST likely indicated by this finding?

A. CSRF
B. XSS
C. SQL injection
D.Directory traversal