Given the following extract from the snort log on a honeypot, what do you infer from the attack?

Posted by: Pdfprep Category: CEH-001 Tags: , ,

Exhibit:

Given the following extract from the snort log on a honeypot, what do you infer from the attack?
A . A new port was opened
B . A new user id was created
C . The exploit was successful
D . The exploit was not successful

Answer: D

Explanation:

The attacker submits a PASS to the honeypot and receives a login incorrect before disconnecting.

Leave a Reply

Your email address will not be published.