Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Cisco Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) 200-201 Question # 59 Topic 6 Discussion

Cisco Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) 200-201 Question # 59 Topic 6 Discussion

200-201 Exam Topic 6 Question 59 Discussion:
Question #: 59
Topic #: 6

Refer to the exhibit.

200-201 Question 59

An engineer is analyzing a PCAP file after a recent breach An engineer identified that the attacker used an aggressive ARP scan to scan the hosts and found web and SSH servers. Further analysis showed several SSH Server Banner and Key Exchange Initiations. The engineer cannot see the exact data being transmitted over an encrypted channel and cannot identify how the attacker gained access How did the attacker gain access?


A.

by using the buffer overflow in the URL catcher feature for SSH


B.

by using an SSH Tectia Server vulnerability to enable host-based authentication


C.

by using an SSH vulnerability to silently redirect connections to the local host


D.

by using brute force on the SSH service to gain access


Get Premium 200-201 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.