GAQM Certified Ethical Hacker (CEH) CEH-001 Question # 99 Topic 10 Discussion

GAQM Certified Ethical Hacker (CEH) CEH-001 Question # 99 Topic 10 Discussion

CEH-001 Exam Topic 10 Question 99 Discussion:
Question #: 99
Topic #: 10

The following excerpt is taken from a honeyput log. The log captures activities across three days. There are several intrusion attempts; however, a few are successful. Study the log given below and answer the following question:

(Note: The objective of this questions is to test whether the student has learnt about passive OS fingerprinting (which should tell them the OS from log captures): can they tell a SQL injection attack signature; can they infer if a user ID has been created by an attacker and whether they can read plain source – destination entries from log entries.)

CEH-001 Question 99

What can you infer from the above log?


A.

The system is a windows system which is being scanned unsuccessfully.


B.

The system is a web application server compromised through SQL injection.


C.

The system has been compromised and backdoored by the attacker.


D.

The actual IP of the successful attacker is 24.9.255.53.


Get Premium CEH-001 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.