Question: ANSWER ALLLL 37. What browser feature allows potential attackers to see hidden form fields? Choice a Check Fields Choice b Show All Choice c Open

ANSWER ALLLL

37. What browser feature allows potential attackers to see hidden form fields?

Choice a

Check Fields

Choice b

Show All

Choice c

Open Code

Choice d

View Source

38. When Dave sends Janet a confidential message using RSA encryption, what key gets used to encrypt the message?

Choice a

Dave's Private Key

Choice b

Dave's Public key

Choice c

Janet's Private Key

Choice d

Janet's Public Key

39. Using Netcat, what would be the syntax to setup a listening back door from a compromised Windows Server that will spawn a shell when connecting to the remote server on port 777?

Choice a

nc -p 777 sh cmd.exe

Choice b

nc sh p 777 e cmd.exe

Choice c

nc -p 777 exec cmd.exe

Choice d

nc -L -p 777 -e cmd.exe

40. Which of the following requires user action to conduct malicious actions?

Choice a

Virus

Choice b

Worms

Choice c

Trojans

Choice d

Logic Bombs

35. Name Servers are the Penetration Tester's best friend. The Domain Name Registration database contains information about who registered a particular domain. What common command line as well as web based tool could be used to extract this information from the public database of Domain Name registration?

Choice a

whois

Choice b

SOA Query tool

Choice c

traceroute

Choice d

Resolv

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!