Which of the following attacks is used to hack simple alphabetical passwords?
Which of the following attacks is used to hack simple alphabetical passwords?
Which of the following is the name given to expert groups that handle computer security incidents?
Which of the following is the name given to expert groups that handle computer security incidents?
Which of the following programs is used to monitor the keystrokes that a user types on a specific computerR
Which of the following programs is used to monitor the keystrokes that a user types on a specific
computer’s keyboard?
Which of the following are the two types of reconnaissance?
Which of the following are the two types of reconnaissance?
What level of encryption is used by syskey?
What level of encryption is used by syskey?
Which of the following statements about ‘Printenv’ vulnerability are true?
John works as a professional Ethical Hacker. He has been assigned a project to test the security
of www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure
server.
The output of the scanning test is as follows:
C.\whisker.pl -h target_IP_address
— whisker / v1.4.0 / rain forest puppy / www.wiretrip.net — = – = – = – = – =
= Host: target_IP_address
= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1
mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22
+ 200 OK: HEAD /cgi-bin/printenv
John recognizes /cgi-bin/printenv vulnerability (‘Printenv’ vulnerability) in the We_are_secure server.
Which of the following statements about ‘Printenv’ vulnerability are true?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following protocols is used the most by web servers?
Which of the following protocols is used the most by web servers?
Which of the following protocols does Microsoft Windows use for traceroute?
Which of the following protocols does Microsoft Windows use for traceroute?
Which of the following protocols allows a service to authenticate the identity of a user without needing to se
Which of the following protocols allows a service to authenticate the identity of a user without
needing to see a password?
which the attacker secretly listens to the private conversation between victims?
Which of the following is a technique of attacks in which the attacker secretly listens to the private
conversation between victims?