Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Logical Operations Exam CFR-210 Topic 6 Question 54 Discussion

Actual exam question for Logical Operations's CFR-210 exam
Question #: 54
Topic #: 6
[All CFR-210 Questions]

An attack was performed on a company's web server, disabling the company's website. The incident response team's investigation produced the following:

1. Presence of malicious code installed on employees' workstations.

2. Excessive UDP datagrams sent to a single address.

3. Web server received excessive UDP datagrams from multiple internal hosts.

4. Network experienced high traffic after 3:00 pm.

5. Employee workstations sent large traffic bursts when employees accessed the internal timecard application.

Which of the following BEST describes the attack tool used to perform the attack?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Percy
24 days ago
Ah, the old 'my dog ate my homework' excuse. I bet the employees were just trying to beat their high scores on the internal timecard app. Gotta love those gaming addicts!
upvoted 0 times
...
Tawny
30 days ago
I'm going with Nessus on this one. The network scan and excessive UDP traffic are classic signs of a vulnerability assessment tool like Nessus being used for an attack.
upvoted 0 times
Francoise
2 days ago
I'm leaning towards Logic bomb. It seems like the attack was timed to cause maximum disruption.
upvoted 0 times
...
Janine
7 days ago
I agree, Metasploit is a powerful tool for exploiting vulnerabilities.
upvoted 0 times
...
Dianne
13 days ago
I think it might be Metasploit. It's a common tool used for launching attacks.
upvoted 0 times
...
...
Monroe
2 months ago
Hmm, this sounds like a classic case of a logic bomb. The employees' timecard application being targeted and the traffic bursts seem to indicate a timed payload triggered by user activity.
upvoted 0 times
Colene
8 days ago
I think the excessive UDP datagrams sent to a single address and from multiple internal hosts point towards Metasploit being used in the attack.
upvoted 0 times
...
Tracie
9 days ago
I agree, the timed payload triggered by user activity is a key indicator of a logic bomb.
upvoted 0 times
...
Kris
15 days ago
I think you're right, a logic bomb makes sense given the symptoms described in the investigation.
upvoted 0 times
...
Royal
16 days ago
I agree, the pattern of traffic bursts and the targeted application point towards a logic bomb.
upvoted 0 times
...
...
Geraldine
2 months ago
I think the attack tool used here is Metasploit. The presence of malicious code on employee workstations and the high traffic patterns suggest the use of a sophisticated toolkit like Metasploit.
upvoted 0 times
...
Hubert
2 months ago
I'm not sure, but I think Nessus could also be a possibility based on the excessive UDP datagrams sent.
upvoted 0 times
...
Ellen
2 months ago
Based on the information provided, it seems like a Distributed Denial of Service (DDoS) attack using a botnet. The excessive UDP datagrams and high traffic after 3:00 pm point to a DDoS attempt.
upvoted 0 times
Devora
16 days ago
D) Metasploit
upvoted 0 times
...
Nickolas
19 days ago
C) Nessus
upvoted 0 times
...
Tula
25 days ago
B) Logic bomb
upvoted 0 times
...
Miesha
28 days ago
A) KeyLogger
upvoted 0 times
...
...
Vilma
2 months ago
I agree with Regenia, Metasploit seems like the most likely tool used.
upvoted 0 times
...
Regenia
2 months ago
I think the attack tool used was Metasploit.
upvoted 0 times
...

Save Cancel