PrepAway - Latest Free Exam Questions & Answers

Tag: Exam ECSS

What were the claims made by SCO on IBM regarding the use of the Linux operating system?

On March 6, 2003, The SCO Group asserted that there are legal uncertainties regarding the use
of the Linux operating system due to alleged violations of IBM’s Unix licenses in the development
of Linux code at IBM.
What were the claims made by SCO on IBM regarding the use of the Linux operating system?
Each correct answer represents a complete solution. Choose all that apply.

Which of the following statements about ‘Printenv’ vulnerability are true?

John works as a professional Ethical Hacker. He has been assigned a project to test the security
of www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure
server.
The output of the scanning test is as follows:
C.\whisker.pl -h target_IP_address
— whisker / v1.4.0 / rain forest puppy / www.wiretrip.net — = – = – = – = – =
= Host: target_IP_address
= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1
mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22
+ 200 OK: HEAD /cgi-bin/printenv
John recognizes /cgi-bin/printenv vulnerability (‘Printenv’ vulnerability) in the We_are_secure
server. Which of the following statements about ‘Printenv’ vulnerability are true?
Each correct answer represents a complete solution. Choose all that apply.

Which of the following programs can Mark use to fulfill this requirement?

Mark has been assigned a project to configure a wireless network for a company. The network
should contain a Windows 2003 server and 30 Windows XP client computers. Mark has a single
dedicated Internet connection that has to be shared among all the client computers and the server.
The configuration needs to be done in a manner that the server should act as a proxy server for
the client computers. Which of the following programs can Mark use to fulfill this requirement?

Which of the following software is Mark discussing about?

You work as a computer operator for BlueWells Inc. The company has a Windows-based network.
You find out that someone has manipulated your email account, as some of your mails have been
deleted. You suspect that your password has been hacked by someone. You inform about this to
Mark, who is a Security Administrator. After diagnosing your system, Mark finds a log file that
contains lots of text including username and password. Mark tells you that someone has installed
software on your system that is recording all the keyboard strokes in a predefined log file. Which of
the following software is Mark discussing about?

What will you open to start the process of connecting to a wireless network?

You work as a system administrator for BlueSkwer.com. You have just finished installing and
configuring a new laptop for the CEO. The laptop has Windows 7 operating system. You have just
deployed a secure wireless network in the company. Alex, the CEO, wants you to connect his
laptop to the wireless network. What will you open to start the process of connecting to a wireless network?


Page 12 of 28« First...1011121314...20...Last »