Which of the following is a command line packet analyzer similar to GUI-based Wireshark?
A.
Jack the ripper
B.
nessus
C.
tcpdump
D.
ethereal
tcpdump
What is the most common method to exploit the “Bash Bug” or ShellShock” vulnerability?
A.
SSH
B.
SYN Flood
C.
Manipulate format strings in text fields
D.
Through Web servers utilizing CGI (CommonGateway Interface) to send a malformed
environment variable to a vulnerable Web server
Through Web servers utilizing CGI (CommonGateway Interface) to send a malformed
environment variable to a vulnerable Web server
It is a vulnerability in GNU’s bash shell, discovered in September of 2004, that gives
attackers access to run remote commands on a vulnerable system. The malicious software
can take control of an infected machine, launch denial-of service attacks to disrupt
websites, and scan for other vulnerable devices (including routers).
Which of the following vulnerabilities is being described?
A.
Shellshock
B.
Rootshock
C.
Shellbash
D.
Rootshell
Shellshock
During a security audit of IT processes, an IS auditor found that there was no documented
security procedures. What should the IS auditor do?
A.
Terminate the audit.
B.
Identify and evaluate existing practices.
C.
Create a procedures document
D.
Conduct compliance testing
Identify and evaluate existing practices.
An attacker has installed a RAT on a host. The attacker wants to ensure that when a user
attempts to go to www.MyPersonalBank.com, that the user is directed to a phishing site.
Which file does the attacker needto modify?
A.
Hosts
B.
Networks
C.
Boot.ini
D.
Sudoers
Hosts
Page 4 out of 25 Pages |
Previous |