ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 44 Topic 5 Discussion

ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 44 Topic 5 Discussion

EC0-350 Exam Topic 5 Question 44 Discussion:
Question #: 44
Topic #: 5

In the following example, which of these is the "exploit"?

Today, Microsoft Corporation released a security notice. It detailed how a person could bring down the Windows 2003 Server operating system, by sending malformed packets to it. They detailed how this malicious process had been automated using basic scripting. Even worse, the new automated method for bringing down the server has already been used to perform denial of service attacks on many large commercial websites.

Select the best answer.


A.

Microsoft Corporation is the exploit.


B.

The security "hole" in the product is the exploit.


C.

Windows 2003 Server


D.

The exploit is the hacker that would use this vulnerability.


E.

The documented method of how to use the vulnerability to gain unprivileged access.


Get Premium EC0-350 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.