Independence Day Deal! Unlock 25% OFF Today – Limited-Time Offer - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 300-215 Topic 5 Question 49 Discussion

Actual exam question for Cisco's 300-215 exam
Question #: 49
Topic #: 5
[All 300-215 Questions]

Refer to the exhibit.

Which two determinations should be made about the attack from the Apache access logs? (Choose two.)

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

Lynda
2 months ago
I love how the question is trying to trick us with those answer choices. Gotta stay on our toes for these tricky certification exams, am I right? *chuckles*
upvoted 0 times
Ruth
6 days ago
Yeah, they definitely try to make it tricky with those answer choices. Gotta be careful with these exams.
upvoted 0 times
...
Detra
14 days ago
C) The attacker performed a brute force attack against word press and used sql injection against the backend database.
upvoted 0 times
...
Haydee
1 months ago
A) The attacker used r57 exploit to elevate their privilege.
upvoted 0 times
...
...
Allene
2 months ago
Definitely not E! Logging in normally to the admin page is not an 'attack' per se. The logs point to more sophisticated attempts to compromise the system.
upvoted 0 times
...
Ryan
2 months ago
D looks promising too. The file manager plugin could have been used to upload the r57.php shell. But I agree B and C are the best choices based on the information provided.
upvoted 0 times
Agreed, those seem to be the most likely scenarios based on the Apache access logs.
upvoted 0 times
...
Andrew
7 days ago
I think B and C are the best choices. The attacker uploaded the word press file manager trojan and performed a brute force attack with sql injection.
upvoted 0 times
...
...
Carmela
2 months ago
I think the correct answers are B and C. The access logs show clear signs of a WordPress attack, including attempted SQL injection and uploading of a malicious file.
upvoted 0 times
...
Selma
2 months ago
I agree with Rosamond and Dalene, those seem like the most likely determinations based on the Apache access logs.
upvoted 0 times
...
Dalene
2 months ago
I believe the attacker uploaded the word press file manager trojan.
upvoted 0 times
...
Rosamond
2 months ago
I think the attacker used the r57 exploit to elevate their privilege.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77