Question 186

A security analyst noticed the following entry on a web server log:
Warning: fopen (http://127.0.0.1:16) : failed to open stream:
Connection refused in /hj/var/www/showimage.php on line 7
Which of the following malicious activities was most likely attempted?
  • Question 187

    A security analyst recently used Arachni to perform a vulnerability assessment of a newly developed web application. The analyst is concerned about the following output:
    [+] XSS: In form input 'txtSearch' with action
    https://localhost/search.aspx
    [-] XSS: Analyzing response #1...
    [-] XSS: Analyzing response #2...
    [-] XSS: Analyzing response #3...
    [+] XSS: Response is tainted. Looking for proof of the vulnerability.
    Which of the following is the most likely reason for this vulnerability?
  • Question 188

    A security analyst reviews the latest vulnerability scans and observes there are vulnerabilities with similar CVSSv3 scores but different base score metrics. Which of the following attack vectors should the analyst remediate first?
  • Question 189

    A web application team notifies a SOC analyst that there are thousands of HTTP/404 events on the public-facing web server. Which of the following is the next step for the analyst to take?
  • Question 190

    A disgruntled open-source developer has decided to sabotage a code repository with a logic bomb that will act as a wiper. Which of the following parts of the Cyber Kill Chain does this act exhibit?