Question 6 of 88

Which of the following attacks would use ".." notation as part of a web request to access restricted files and directories, and possibly execute code on the web server?
Answer

Suggested Answer

The suggested answer is A.

Community Votes

No votes yet

Join the discussion to cast yours

Question 7 of 88

At the start of an investigation on a Windows system, the lead handler executes the following commands after inserting a USB drive. What is the purpose of this command? C:\ >dir / s / a dhsra d: \ > a: \ IRCD.txt
Answer

Suggested Answer

The suggested answer is C.

Community Votes

No votes yet

Join the discussion to cast yours

Question 8 of 88

Why might an administrator not be able to delete a file using the Windows del command without specifying additional command line switches?
Answer

Suggested Answer

The suggested answer is A.

Community Votes

No votes yet

Join the discussion to cast yours

Question 9 of 88

Why would the pass action be used in a Snort configuration file?
Answer

Suggested Answer

The suggested answer is A.

Community Votes

No votes yet

Join the discussion to cast yours

Question 10 of 88

On which layer of the OSI Reference Model does the FWSnort utility function?
Answer

Suggested Answer

The suggested answer is C.

Community Votes2 votes
EMost voted
100%