Which of the following tools can you use to accomplish the task?
You work as a professional Ethical Hacker. You are assigned a project to perform blackbox testing
of the security of www.we-are-secure.com. Now you want to perform banner grabbing to retrieve
information about the Webserver being used by we-are-secure. Which of the following tools can
you use to accomplish the task?
Which of the following tools should you use to accomplish the task?
You work as the Network Administrator for McNeil Inc. The company has a Linux-based network.
You are working as a root user on Red Hat operating system. You are currently running a program
named My_program. You are getting some error messages while executing the program. You
want to redirect these error messages to a file named file2 rather than being displayed on the
screen.
Which of the following tools should you use to accomplish the task?
Which of the following tools can John use to conduct it?
John works as a professional Ethical Hacker. He has been assigned the project of testing the
security of www.we-are-secure.com. He has successfully completed the following pre-attack
phases while testing the security of the server:
· Footprinting
· Scanning
Now he wants to conduct the enumeration phase. Which of the following tools can John use to
conduct it?
Each correct answer represents a complete solution. Choose all that apply.
Where will you place the Web server?
You work as a Network Administrator for Infonet Inc. The company’s network is connected to the
Internet. The network has a Web server that is accessible to Internet users. For security, you want
to keep the Web server separate from other servers on the network. Where will you place the Web
server?
Which of the following tools is used to catch someone installing a rootkit or running a packet sniffer?
Which of the following tools is used to catch someone installing a rootkit or running a packet
sniffer?
Which of the following commands will you use?
You work as a Network Administrator for Maverick Inc. The company has a Linux-based network.
You are working on a Linux computer. You want to see the environment variables that are set on
your computer. Which of the following commands will you use?
Which of the following statements are true about Public-key cryptography?
Which of the following statements are true about Public-key cryptography?
Each correct answer represents a complete solution. Choose two.
What were the claims made by SCO on IBM regarding the use of the Linux operating system?
On March 6, 2003, The SCO Group asserted that there are legal uncertainties regarding the use
of the Linux operating system due to alleged violations of IBM’s Unix licenses in the development
of Linux code at IBM.
What were the claims made by SCO on IBM regarding the use of the Linux operating system?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following refers to a computer that must be secure because it is accessible from the Internet and
Which of the following refers to a computer that must be secure because it is accessible from the
Internet and is vulnerable to attacks?
Which of the following statements about ‘Printenv’ vulnerability are true?
John works as a professional Ethical Hacker. He has been assigned a project to test the security
of www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure
server.
The output of the scanning test is as follows:
C.\whisker.pl -h target_IP_address
— whisker / v1.4.0 / rain forest puppy / www.wiretrip.net — = – = – = – = – =
= Host: target_IP_address
= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1
mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22
+ 200 OK: HEAD /cgi-bin/printenv
John recognizes /cgi-bin/printenv vulnerability (‘Printenv’ vulnerability) in the We_are_secure
server. Which of the following statements about ‘Printenv’ vulnerability are true?
Each correct answer represents a complete solution. Choose all that apply.