Defending against which of the following attacks should form the basis of the incident mitigation plan?

Posted by: Pdfprep Category: CAS-001 Tags: , ,

The root cause analysis of a recent security incident reveals that an attacker accessed a printer from the Internet. The attacker then accessed the print server, using the printer as a launch pad for a shell exploit. The print server logs show that the attacker was able to exploit multiple accounts, ultimately launching a successful DoS attack on the domain controller.

Defending against which of the following attacks should form the basis of the incident mitigation plan?
A . DDoS
B . SYN flood
C . Buffer overflow
D . Privilege escalation

Answer: D

Leave a Reply

Your email address will not be published.