- (Topic 8)
After studying the following log entries, what is the attacker ultimately trying to achieve as inferred from the log sequence?
1. mkdir -p /etc/X11/applnk/Internet/.etc
2. mkdir -p /etc/X11/applnk/Internet/.etcpasswd
3. touch -acmr /etc/passwd /etc/X11/applnk/Internet/.etcpasswd
4. touch -acmr /etc /etc/X11/applnk/Internet/.etc
5. passwd nobody -d
6. /usr/sbin/adduser dns -d/bin -u 0 -g 0 -s/bin/bash
7. passwd dns -d
8. touch -acmr /etc/X11/applnk/Internet/.etcpasswd /etc/passwd
9. touch -acmr /etc/X11/applnk/Internet/.etc /etc
Correct Answer:
C
- (Topic 6)
What is the proper response for a NULL scan if the port is closed?
Correct Answer:
E
Closed ports respond to a NULL scan with a reset.
- (Topic 4)
One advantage of an application-level firewall is the ability to
Correct Answer:
B
- (Topic 8)
Which of the following statements best describes the term Vulnerability?
Correct Answer:
A
Vulnerabilities are all weaknesses that can be exploited.
- (Topic 5)
Which of the following are variants of mandatory access control mechanisms? (Choose two.)
Correct Answer:
AC