exam questions

Exam 300-215 All Questions

View all questions & answers for the 300-215 exam

Exam 300-215 topic 1 question 25 discussion

Actual exam question from Cisco's 300-215
Question #: 25
Topic #: 1
[All 300-215 Questions]


Refer to the exhibit. Which two determinations should be made about the attack from the Apache access logs? (Choose two.)

  • A. The attacker used r57 exploit to elevate their privilege.
  • B. The attacker uploaded the word press file manager trojan.
  • C. The attacker performed a brute force attack against word press and used sql injection against the backend database.
  • D. The attacker used the word press file manager plugin to upoad r57.php.
  • E. The attacker logged on normally to word press admin page.
Show Suggested Answer Hide Answer
Suggested Answer: CD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
kyle942
8 months, 4 weeks ago
Selected Answer: DE
https://securityboulevard.com/2019/10/using-logs-to-investigate-sql-injection-attack-example/
upvoted 1 times
...
Bobster02
1 year, 11 months ago
B and D to be exact.
upvoted 1 times
...
Bobster02
1 year, 11 months ago
B and C are correct answers.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...