Cisco Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) 300-215 Question # 17 Topic 2 Discussion

Cisco Conducting Forensic Analysis and Incident Response Using Cisco CyberOps Technologies (CBRFIR) 300-215 Question # 17 Topic 2 Discussion

300-215 Exam Topic 2 Question 17 Discussion:
Question #: 17
Topic #: 2

Refer to the exhibit.

300-215 Question 17

Which two determinations should be made about the attack from the Apache access logs? (Choose two.)


A.

The attacker used r57 exploit to elevate their privilege.


B.

The attacker uploaded the WordPress file manager trojan.


C.

The attacker performed a brute force attack against WordPress and used SQL injection against the backend database.


D.

The attacker used the WordPress file manager plugin to upload r57.php.


E.

The attacker logged on normally to WordPress admin page.


Get Premium 300-215 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.