Question: ANSWER ALLLL 37. What browser feature allows potential attackers to see hidden form fields? Choice a Check Fields Choice b Show All Choice c Open
ANSWER ALLLL
37. What browser feature allows potential attackers to see hidden form fields?
Choice a
Check Fields
Choice b
Show All
Choice c
Open Code
Choice d
View Source
38. When Dave sends Janet a confidential message using RSA encryption, what key gets used to encrypt the message?
Choice a
Dave's Private Key
Choice b
Dave's Public key
Choice c
Janet's Private Key
Choice d
Janet's Public Key
39. Using Netcat, what would be the syntax to setup a listening back door from a compromised Windows Server that will spawn a shell when connecting to the remote server on port 777?
Choice a
nc -p 777 sh cmd.exe
Choice b
nc sh p 777 e cmd.exe
Choice c
nc -p 777 exec cmd.exe
Choice d
nc -L -p 777 -e cmd.exe
40. Which of the following requires user action to conduct malicious actions?
Choice a
Virus
Choice b
Worms
Choice c
Trojans
Choice d
Logic Bombs
35. Name Servers are the Penetration Tester's best friend. The Domain Name Registration database contains information about who registered a particular domain. What common command line as well as web based tool could be used to extract this information from the public database of Domain Name registration?
Choice a
whois
Choice b
SOA Query tool
Choice c
traceroute
Choice d
Resolv
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
