Dora is examining her log files and notices several access attempts with the following string:
GET/default.ida?NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN%u9090%u688%ucbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u6858%ucbd3%u7801%u9090%u900%u8190%u00c3%u0003%u8b00%u531b%u5 3ff%u0078%u0000%u00=a HTTP/1.0
She opens a browser to visit her own website and notices the front page had been defaced to say the following:
"HELLO! Welcome to http://www.worm.com! Hacked By Chinese!"
What may have happened?
A) Code Red got to her web server
B) An attacker used a fuzzer to overflow the query string
C) Class case of Michelangelo
D) The Nachi worm found her site and successfully exploited it.
Correct Answer:
Verified
Q19: A virus that XORs a keystream with
Q20: Chandler is having a conversation with Benjamin,
Q21: Which of these types of Virus primarily
Q22: What is generally considered to be the
Q23: Which of the following viruses had five
Q25: Microsoft knowledge base bulletin MS03-026 describes an
Q26: What are the six steps of the
Q27: Kelly sent an email out to the
Q28: Melissa receives an email that comes from
Q29: What is the term used to describe
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents