After discovering a buffer overflow vulnerability an application the security analyst needs to report it to the development team leader.
Which of the following are MOST to appear m the impact section of the report? (Select TWO).
A . An attacker can obtain privileged data handled by the application
B . An attacker can inject DLLs into the server via the application
C . An attacker can pivot to other servers using the application
D . An attacker can execute arbitrary code using the application
E . An attacker can execute a DDoS on the server
Answer: D,E
Latest SY0-501 Dumps Valid Version with 1130 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund