ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 400 - SY0-601 discussion

Report
Export

Security analysts notice a server login from a user who has been on vacation for two weeks, The analysts confirm that the user did not log in to the system while on vacation After reviewing packet capture the analysts notice the following:

Which of the following occurred?

A.
A buffer overflow was exploited to gain unauthorized access.
Answers
A.
A buffer overflow was exploited to gain unauthorized access.
B.
The user's account was con-promised, and an attacker changed the login credentials.
Answers
B.
The user's account was con-promised, and an attacker changed the login credentials.
C.
An attacker used a pass-the-hash attack to gain access.
Answers
C.
An attacker used a pass-the-hash attack to gain access.
D.
An insider threat with username logged in to the account.
Answers
D.
An insider threat with username logged in to the account.
Suggested answer: C

Explanation:

A pass-the-hash attack is a type of replay attack that captures and uses the hash of a password. The attacker then attempts to log on as the user with the stolen hash. This type of attack is possible because some authentication protocols send hashes over the network instead of plain text passwords.

The packet capture shows that the attacker used NTLM authentication, which is vulnerable to passthe-hash attacks

asked 02/10/2024
Fiston LOMATE
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first