Exhibit:
Given the following extract from the snort log on a honeypot, what do you infer from the attack?
A.
A new port was opened
B.
A new user id was created
C.
The exploit was successful
D.
The exploit was not successful
Exhibit:
Given the following extract from the snort log on a honeypot, what do you infer from the attack?
A.
A new port was opened
B.
A new user id was created
C.
The exploit was successful
D.
The exploit was not successful