Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Logical Operations Exam CFR-210 Topic 4 Question 88 Discussion

Actual exam question for Logical Operations's CFR-210 exam
Question #: 88
Topic #: 4
[All CFR-210 Questions]

An attack was performed on a company's web server, disabling the company's website. The incident response team's investigation produced the following:

1. Presence of malicious code installed on employees' workstations.

2. Excessive UDP datagrams sent to a single address.

3. Web server received excessive UDP datagrams from multiple internal hosts.

4. Network experienced high traffic after 3:00 pm.

5. Employee workstations sent large traffic bursts when employees accessed the internal timecard application.

Which of the following BEST describes the attack tool used to perform the attack?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Daren
22 hours ago
DDoS all the way. The poor IT team must have been running around like headless chickens trying to plug all those leaks. I bet the boss was not happy about the website being down.
upvoted 0 times
...
Kathryn
5 days ago
Definitely a DDoS attack. Although it's not explicitly stated, the 'excessive UDP datagrams' and 'high traffic' are textbook DDoS indicators. I hope the IT team was able to mitigate the attack quickly!
upvoted 0 times
...
Carey
13 days ago
I'm not sure, but I think Nessus could also be a possibility given the excessive UDP datagrams sent to a single address.
upvoted 0 times
...
Cecil
18 days ago
I agree, the description points to a DDoS attack. The presence of malicious code on employee workstations and the traffic bursts from the internal timecard application are classic signs.
upvoted 0 times
Pete
6 days ago
A: I think the attack was a DDoS attack.
upvoted 0 times
...
...
Roslyn
21 days ago
I agree with Nicholle, Metasploit seems like the most likely tool used based on the investigation findings.
upvoted 0 times
...
Nicholle
26 days ago
I think the attack tool used was Metasploit.
upvoted 0 times
...
Lili
1 months ago
Based on the information provided, it sounds like a distributed denial-of-service (DDoS) attack. The excessive UDP datagrams and high traffic after 3:00 pm suggest a coordinated attack from multiple internal hosts.
upvoted 0 times
Willis
2 days ago
D) Metasploit
upvoted 0 times
...
Stephaine
8 days ago
C) Nessus
upvoted 0 times
...
Jina
16 days ago
B) Logic bomb
upvoted 0 times
...
Nathalie
24 days ago
A) KeyLogger
upvoted 0 times
...
...

Save Cancel