Which of the follow...
 
Notifications
Clear all

Which of the following conclusions is supported by the application log?

1 Posts
1 Users
0 Likes
131 Views
(@rickielewis)
Noble Member
Joined: 2 years ago
Posts: 713
Topic starter  

An application server runs slowly and then triggers a high CPU alert. After investigating, a security analyst finds an unauthorized program is running on the server.

The analyst reviews the application log below.

Which of the following conclusions is supported by the application log?

  • A . An attacker was attempting to perform a buffer overflow attack to execute a payload in memory.
  • B . An attacker was attempting to perform an XSS attack via a vulnerable third-party library.
  • C . An attacker was attempting to download files via a remote command execution vulnerability
  • D . An attacker was attempting to perform a DoS attack against the server.

Show Answer Hide Answer

Suggested Answer: A

   
Quote
Topic Tags

Latest CompTIA CS0-002 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: