Multiple Choice
Refer to the exhibit. Which two determinations should be made about the attack from the Apache access logs? (Choose two.)
A) The attacker used r57 exploit to elevate their privilege.
B) The attacker uploaded the word press file manager trojan.
C) The attacker performed a brute force attack against word press and used sql injection against the backend database.
D) The attacker used the word press file manager plugin to upoad r57.php.
E) The attacker logged on normally to word press admin page.
Correct Answer:
Verified
Related Questions