What were the claims made by SCO on IBM regarding the use of the Linux operating system?
On March 6, 2003, The SCO Group asserted that there are legal uncertainties regarding the use
of the Linux operating system due to alleged violations of IBM’s Unix licenses in the development
of Linux code at IBM.
What were the claims made by SCO on IBM regarding the use of the Linux operating system?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following refers to a computer that must be secure because it is accessible from the Internet and
Which of the following refers to a computer that must be secure because it is accessible from the
Internet and is vulnerable to attacks?
Which of the following statements about ‘Printenv’ vulnerability are true?
John works as a professional Ethical Hacker. He has been assigned a project to test the security
of www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure
server.
The output of the scanning test is as follows:
C.\whisker.pl -h target_IP_address
— whisker / v1.4.0 / rain forest puppy / www.wiretrip.net — = – = – = – = – =
= Host: target_IP_address
= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1
mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22
+ 200 OK: HEAD /cgi-bin/printenv
John recognizes /cgi-bin/printenv vulnerability (‘Printenv’ vulnerability) in the We_are_secure
server. Which of the following statements about ‘Printenv’ vulnerability are true?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following programs can Mark use to fulfill this requirement?
Mark has been assigned a project to configure a wireless network for a company. The network
should contain a Windows 2003 server and 30 Windows XP client computers. Mark has a single
dedicated Internet connection that has to be shared among all the client computers and the server.
The configuration needs to be done in a manner that the server should act as a proxy server for
the client computers. Which of the following programs can Mark use to fulfill this requirement?
Which of the following are the types of DOS commands?
Which of the following are the types of DOS commands?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following steps will he take to stop the Spam?
Adam, a novice Web user is getting large amount of unsolicited commercial emails on his email
address. He suspects that the emails he is receiving are the Spam. Which of the following steps
will he take to stop the Spam?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following software is Mark discussing about?
You work as a computer operator for BlueWells Inc. The company has a Windows-based network.
You find out that someone has manipulated your email account, as some of your mails have been
deleted. You suspect that your password has been hacked by someone. You inform about this to
Mark, who is a Security Administrator. After diagnosing your system, Mark finds a log file that
contains lots of text including username and password. Mark tells you that someone has installed
software on your system that is recording all the keyboard strokes in a predefined log file. Which of
the following software is Mark discussing about?
What are the goals of using this tool?
You have been assigned the job of configuring wireless networks for a large company. The
security of these networks is of great importance. One of the tools that you can use for applying
security is Wireless Transport Layer Security (WTLS). What are the goals of using this tool?
Each correct answer represents a complete solution. Choose all that apply.
What will you open to start the process of connecting to a wireless network?
You work as a system administrator for BlueSkwer.com. You have just finished installing and
configuring a new laptop for the CEO. The laptop has Windows 7 operating system. You have just
deployed a secure wireless network in the company. Alex, the CEO, wants you to connect his
laptop to the wireless network. What will you open to start the process of connecting to a wireless network?
Which of the following techniques will the attacker use to accomplish the task?
An attacker wants to launch an attack on a wired Ethernet. He wants to accomplish the following tasks:
· Sniff data frames on a local area network.
· Modify the network traffic.
· Stop the network traffic frequently.
Which of the following techniques will the attacker use to accomplish the task?