Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Test for?
Correct Answer:
D
Which of the following is the primary objective of a rootkit?
Correct Answer:
C
Shellshock allowed an unauthorized user to gain access to a server. It affected many Internet-facing services, which OS did it not directly affect?
Correct Answer:
D
When a normal TCP connection starts, a destination host receives a SYN (synchronize/start) packet from a source host and sends back a SYN/ACK (synchronize acknowledge). The destination host must then hear an ACK (acknowledge) of the SYN/ACK before the connection is established. This is referred to as the "TCP three-way handshake." While waiting for the ACK to the SYN ACK, a connection queue of finite size on the destination host keeps track of connections waiting to be completed. This queue typically empties quickly since the ACK is expected to arrive a few milliseconds after the SYN ACK.
How would an attacker exploit this design by launching TCP SYN attack?
Correct Answer:
B
What is the main security service a cryptographic hash provides?
Correct Answer:
D