What is the most common method to exploit the Bash Bug or ShellShock

What is the most common method to exploit the bash

This preview shows page 39 - 40 out of 40 pages.

QUESTION 58What is the most common method to exploit the “Bash Bug” or “ShellShock" vulnerability? A.Manipulate format strings in text fieldsB.SSHC.SYN FloodD.Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web serverCorrect Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 59What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed? D Section: (none) Explanation Explanation/Reference: QUESTION 60A hacker has managed to gain access to a Linux host and stolen the password file from /etc/passwd. How can he use it?
Image of page 39
B Section: (none) Explanation Explanation/Reference: QUESTION 61A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locallyto other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24. Which of the following has occurred? B Section: (none) Explanation Explanation/Reference:
Image of page 40

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture