What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?
env x=’(){ :;};echo exploit’ bash Cc ‘cat/etc/passwd’ What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?A . Removes the passwd file B. Changes all passwords in passwd C. Add new user to the passwd file D. Display passwd content to promptView AnswerAnswer: D
What type of an alert is this?
When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator’s Computer to update the router configuration. What type of an alert is this?A . False negative B. True negative C. True positive D. False positiveView AnswerAnswer: D Explanation:...
Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?
Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?A . Kismet B. Abel C. Netstumbler D. NessusView AnswerAnswer: A Explanation: https://en.wikipedia.org/wiki/Kismet_(software) Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work...
What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key?
What is the known plaintext attack used against DES which gives the result that encrypting plaintext with one DES key followed by encrypting it with a second DES key is no more secure than using a single key?A . Man-in-the-middle attack B. Meet-in-the-middle attack C. Replay attack D. Traffic analysis...
Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?
DHCP snooping is a great solution to prevent rogue DHCP servers on your network. Which security feature on switchers leverages the DHCP snooping database to help prevent man-in-the-middle attacks?A . Spanning tree B. Dynamic ARP Inspection (DAI) C. Port security D. Layer 2 Attack Prevention Protocol (LAPP)View AnswerAnswer: B Explanation:...
PGP, SSL, and IKE are all examples of which type of cryptography?
PGP, SSL, and IKE are all examples of which type of cryptography?A . Digest B. Secret Key C. Public Key D. Hash AlgorithmView AnswerAnswer: C
Which of the following programs is usually targeted at Microsoft Office products?
Which of the following programs is usually targeted at Microsoft Office products?A . Polymorphic virus B. Multipart virus C. Macro virus D. Stealth virusView AnswerAnswer: C Explanation: A macro virus is a virus that is written in a macro language: a programming language which is embedded inside a software application...
Which file does the attacker need to modify?
An attacker has installed a RAT on a host. The attacker wants to ensure that when a user attempts to go to "www.MyPersonalBank.com", the user is directed to a phishing site. Which file does the attacker need to modify?A . Boot.ini B. Sudoers C. Networks D. HostsView AnswerAnswer: D
You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alert tcp any any -> 192.168.100.0/24 21 (msg: ““FTP on the network!””;)
You just set up a security system in your network. In what kind of system would you find the following string of characters used as a rule within its configuration? alert tcp any any -> 192.168.100.0/24 21 (msg: ““FTP on the network!””;)A . A firewall IPTable B. FTP Server rule...
Which is the first step followed by Vulnerability Scanners for scanning a network?
Which is the first step followed by Vulnerability Scanners for scanning a network?A . OS Detection B. Firewall detection C. TCP/UDP Port scanning D. Checking if the remote host is aliveView AnswerAnswer: D Explanation: Vulnerability scanning solutions perform vulnerability penetration tests on the organizational network in three steps: