ExamGecko
Home Home / ISC / CISSP
Question list
Search
Search

Question 700 - CISSP discussion

Report
Export

An organization discovers that its secure file transfer protocol (SFTP) server has been accessed by an unauthorized person to download an unreleased game. A recent security audit found weaknesses in some of the organization's general information technology (IT) controls, specifically pertaining to software change control and security patch management, but not in other control areas.

Which of the following is the MOST probable attack vector used in the security breach?

A.
Buffer overflow
Answers
A.
Buffer overflow
B.
Weak password able to lack of complexity rules
Answers
B.
Weak password able to lack of complexity rules
C.
Distributed Denial of Service (DDoS)
Answers
C.
Distributed Denial of Service (DDoS)
D.
Cross-Site Scripting (XSS)
Answers
D.
Cross-Site Scripting (XSS)
Suggested answer: A
asked 18/09/2024
Raja Tarazi
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first