Exam4Training

Which of the following attacks occurred?

During a forensic investigation, a security analyst discovered that the following command was run on a compromised host:

Which of the following attacks occurred?
A . Buffer overflow
B. Pass the hash
C. SQL injection
D. Replay attack

Answer: B

Explanation:

Pass the hash is an attack technique that allows an attacker to authenticate to a remote server or service by using the hashed version of a user’s password, rather than requiring the plaintext password

Latest SY0-601 Dumps Valid Version with 396 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version