ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 178 - SY0-601 discussion

Report
Export

During a forensic investigation, a security analyst discovered that the following command was run on a compromised host:

Which of the following attacks occurred?

A.
Buffer overflow
Answers
A.
Buffer overflow
B.
Pass the hash
Answers
B.
Pass the hash
C.
SQL injection
Answers
C.
SQL injection
D.
Replay attack
Answers
D.
Replay attack
Suggested answer: B

Explanation:

Pass the hash is an attack technique that allows an attacker to authenticate to a remote server or service by using the hashed version of a user’s password, rather than requiring the plaintext password

asked 02/10/2024
Gokul Kalaiselvi Loganathan
47 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first