QUESTION 58What is the most common method to exploit the “Bash Bug” or “ShellShock" vulnerability?
A.Manipulate format strings in text fieldsB.SSHC.SYN FloodD.Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web serverCorrect Answer:
D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 59What term describes the amount of risk that remains after the vulnerabilities are classified and the countermeasures have been deployed?
D
Section: (none)
Explanation
Explanation/Reference:
QUESTION 60A hacker has managed to gain access to a Linux host and stolen the password file from /etc/passwd. How can he use it?

B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 61A technician is resolving an issue where a computer is unable to connect to the Internet using a wireless access point. The computer is able to transfer files locallyto other machines, but cannot successfully reach the Internet. When the technician examines the IP address and default gateway they are both on the 192.168.1.0/24. Which of the following has occurred?
B
Section: (none)
Explanation
Explanation/Reference:
