Which of the following agencies is responsible for handling computer crimes in the United States?
Which of the following agencies is responsible for handling computer crimes in the United States?
Which of the following is true for XSS, SQL injection, and RFI?
Which of the following is true for XSS, SQL injection, and RFI?
Which of the following law does not protect intellectual property?
Which of the following law does not protect intellectual property?
Which of the following attacks is used to hack simple alphabetical passwords?
Which of the following attacks is used to hack simple alphabetical passwords?
Which of the following is the name given to expert groups that handle computer security incidents?
Which of the following is the name given to expert groups that handle computer security incidents?
Which of the following programs is used to monitor the keystrokes that a user types on a specific computerR
Which of the following programs is used to monitor the keystrokes that a user types on a specific
computer’s keyboard?
Which of the following are the two types of reconnaissance?
Which of the following are the two types of reconnaissance?
What level of encryption is used by syskey?
What level of encryption is used by syskey?
Which of the following statements about ‘Printenv’ vulnerability are true?
John works as a professional Ethical Hacker. He has been assigned a project to test the security
of www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure
server.
The output of the scanning test is as follows:
C.\whisker.pl -h target_IP_address
— whisker / v1.4.0 / rain forest puppy / www.wiretrip.net — = – = – = – = – =
= Host: target_IP_address
= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1
mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22
+ 200 OK: HEAD /cgi-bin/printenv
John recognizes /cgi-bin/printenv vulnerability (‘Printenv’ vulnerability) in the We_are_secure server.
Which of the following statements about ‘Printenv’ vulnerability are true?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following protocols is used the most by web servers?
Which of the following protocols is used the most by web servers?