An attacker navigates to and enters the following search query in the search field: "` GCIH;whoami "` What is the attacker most likely trying to perform? 1) Search for a valid book regarding GCIH to see how the web server handles normal searches 2) SQL injection 3) Directory traversal 4) Command injection