A security analyst is investigating an incident that was first reported as an issue connecting to network shares and the Internet.
While reviewing logs and tool output, the analyst sees the following:
Which of the following attacks has occurred?
A.
IP conflict B.
Pass-the-hash C.
MAC flooding D.
Directory traversal E.
ARP poisoning.
E.
A security analyst is investigating an incident that was first reported as an issue connecting to network shares and the Internet.
While reviewing logs and tool output, the analyst sees the following:
Which of the following attacks has occurred?
A.
IP conflict
B.
Pass-the-hash
C.
MAC flooding
D.
Directory traversal
E.
ARP poisoning.
E.