What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?
env x=’(){ :;};echo exploit’ bash Cc ‘cat/etc/passwd’ What is the Shellshock bash vulnerability attempting to do on a vulnerable Linux host?A . Removes the passwd fileB . Changes all passwords in passwdC . Add new user to the passwd fileD . Display passwd content to promptView AnswerAnswer: D
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....
“........is an attack type for a rogue Wi-Fi access point that appears to be a legitimate one offered on
“........is an attack type for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. It is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop...
Which of the following is assured by the use of a hash?
Which of the following is assured by the use of a hash?A . AuthenticationB . ConfidentialityC . AvailabilityD . IntegrityView AnswerAnswer: D
Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?
Which of the following tools is used to detect wireless LANs using the 802.11a/b/g/n WLAN standards on a linux platform?A . KismetB . AbelC . NetstumblerD . NessusView AnswerAnswer: A Explanation: https://en.wikipedia.org/wiki/Kismet_(software) Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs. Kismet will work...
Which of the following describes the characteristics of a Boot Sector Virus?
Which of the following describes the characteristics of a Boot Sector Virus?A . Modifies directory table entries so that directory entries point to the virus code instead of the actual program.B . Moves the MBR to another location on the RAM and copies itself to the original location of the...
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....
Which method of password cracking takes the most time and effort?
Which method of password cracking takes the most time and effort?A . Dictionary attackB . Shoulder surfingC . Rainbow tablesD . Brute forceView AnswerAnswer: D Explanation: Brute-force attack when an attacker uses a set of predefined values to attack a target and analyze the response until he succeeds. Success depends...
What is not a PCI compliance recommendation?
What is not a PCI compliance recommendation?A . Use a firewall between the public network and the payment card data.B . Use encryption to protect all transmission of card holder data over any public network.C . Rotate employees handling credit card transactions on a yearly basis to different departments.D ....