ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 59 - CAS-004 discussion

Report
Export

A security analyst is reading the results of a successful exploit that was recently conducted by third-party penetration testers. The testers reverse engineered a privileged executable. In the report, the planning and execution of the exploit is detailed using logs and outputs from the test However, the attack vector of the exploit is missing, making it harder to recommend remediation's. Given the following output:


The penetration testers MOST likely took advantage of:

A.
A TOC/TOU vulnerability
Answers
A.
A TOC/TOU vulnerability
B.
A plain-text password disclosure
Answers
B.
A plain-text password disclosure
C.
An integer overflow vulnerability
Answers
C.
An integer overflow vulnerability
D.
A buffer overflow vulnerability
Answers
D.
A buffer overflow vulnerability
Suggested answer: A
asked 02/10/2024
Srinivasan Kumaresan
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first