Question 171
Which of the following rootkits adds additional code or replaces portions of an operating system, including both the
kernel and associated device drivers?
kernel and associated device drivers?
Question 172
Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to test the network security of the company. He created a webpage to discuss the progress of the tests with employees who were interested in following the test. Visitors were allowed to click on a company's icon to mark the progress of the test. Adam successfully embeds a keylogger. He also added some statistics on the webpage.
The firewall protects the network well and allows strict Internet access.
How was security compromised and how did the firewall respond?
The firewall protects the network well and allows strict Internet access.
How was security compromised and how did the firewall respond?
Question 173
Which of the following tools uses common UNIX/Linux tools like the strings and grep commands to search core system programs for signatures of the rootkits?
Question 174
Which of the following is a version of netcat with integrated transport encryption capabilities?
Question 175
You enter the following URL on your Web browser:
http://www.we-are-secure.com/scripts/..%co%af../..%co%
af../windows/system32/cmd.exe?/c+dir+c:\
What kind of attack are you performing?
http://www.we-are-secure.com/scripts/..%co%af../..%co%
af../windows/system32/cmd.exe?/c+dir+c:\
What kind of attack are you performing?