100%(7)7 out of 7 people found this document helpful
This preview shows page 39 - 40 out of 40 pages.
QUESTION 58What is the most common method to exploit the “Bash Bug” or “ShellShock" vulnerability?A.Manipulate format strings in text fieldsB.SSHC.SYN FloodD.Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web serverCorrect Answer: D Section: (none) ExplanationExplanation/Reference:QUESTION 59What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?D Section: (none) ExplanationExplanation/Reference:QUESTION 60A hacker has managed to gain access to a Linux host and stolen the password file from /etc/passwd. How can he use it?
B Section: (none) ExplanationExplanation/Reference:QUESTION 61A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locallyto other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24. Which of the following has occurred?B Section: (none) ExplanationExplanation/Reference: