CySA+ CS0-001 – Q. 094

0
39

When reviewing network traffic, a security analyst detects suspicious activity:

Based on the log above, which of the following vulnerability attacks is occurring?

A. ShellShock
B. DROWN
C. Zeus
D. Heartbleed
E. POODLE

LEAVE A REPLY

Please enter your comment!
Please enter your name here