List of questions
Related questions
Question 183 - 200-201 discussion
Refer to the exhibit.
An engineer is analyzing a PCAP file after a recent breach An engineer identified that the attacker used an aggressive ARP scan to scan the hosts and found web and SSH servers. Further analysis showed several SSH Server Banner and Key Exchange Initiations. The engineer cannot see the exact data being transmitted over an encrypted channel and cannot identify how the attacker gained access How did the attacker gain access?
by using the buffer overflow in the URL catcher feature for SSH
by using an SSH Tectia Server vulnerability to enable host-based authentication
by using an SSH vulnerability to silently redirect connections to the local host
by using brute force on the SSH service to gain access
0 comments
Leave a comment first