An attacker navigates to and enters the following search query in the search field: "` GCIH;whoami "` What is the attacker most likely trying to perform?
1) Search for a valid book regarding GCIH to see how the web server handles normal searches
2) SQL injection
3) Directory traversal
4) Command injection