NO.67Which of the following types of intrusion techniques is the use of an "under-the-door tool"during a physical security assessment an example of?
NO.68Which of the following excerpts would come from a corporate policy?
NO.69The following command is run on a Linux file system:Chmod 4111 /usr/bin/sudoWhich of the following issues may be exploited now?A.Kernel vulnerabilitiesB.Sticky bitsC.Unquoted service pathD.Misconfigured sudoAnswer:B
NO.70A penetration tester has been asked to conduct OS fingerprinting with Nmap using acompany-provide text file that contain a list of IP addresses.Which of the following are needed to conduct this scan? (Select TWO).
IT Certification Guaranteed, The Easy Way!26