Question 171

Which of the following rootkits adds additional code or replaces portions of an operating system, including both the
kernel and associated device drivers?
  • Question 172

    Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to test the network security of the company. He created a webpage to discuss the progress of the tests with employees who were interested in following the test. Visitors were allowed to click on a company's icon to mark the progress of the test. Adam successfully embeds a keylogger. He also added some statistics on the webpage.
    The firewall protects the network well and allows strict Internet access.
    How was security compromised and how did the firewall respond?
  • Question 173

    Which of the following tools uses common UNIX/Linux tools like the strings and grep commands to search core system programs for signatures of the rootkits?
  • Question 174

    Which of the following is a version of netcat with integrated transport encryption capabilities?
  • Question 175

    You enter the following URL on your Web browser:
    http://www.we-are-secure.com/scripts/..%co%af../..%co%
    af../windows/system32/cmd.exe?/c+dir+c:\
    What kind of attack are you performing?