Exam4Training

Which of the following are MOST to appear m the impact section of the report?

After discovering a buffer overflow vulnerability an application the security analyst needs to report it to the development team leader.

Which of the following are MOST to appear m the impact section of the report? (Select TWO).
A . An attacker can obtain privileged data handled by the application
B . An attacker can inject DLLs into the server via the application
C . An attacker can pivot to other servers using the application
D . An attacker can execute arbitrary code using the application
E . An attacker can execute a DDoS on the server

Answer: D,E

Latest SY0-501 Dumps Valid Version with 1130 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Exit mobile version