00:00

QUESTION 26

- (Topic 2)
You execute the following netcat command:
c:targetnc -1 -p 53 -d -e cmd.exe
What action do you want to perform by issuing the above command?

Correct Answer: C

QUESTION 27

- (Topic 3)
Which of the following characters will you use to check whether an application is vulnerable to an SQL injection attack?

Correct Answer: A

QUESTION 28

- (Topic 4)
How many bits encryption does SHA-1 use?

Correct Answer: D

QUESTION 29

- (Topic 1)
How can a non-privileged user on a Unix system determine if shadow passwords are being used?

Correct Answer: B

QUESTION 30

- (Topic 2)
What is the sequence in which packets are sent when establishing a connection to a secured network?

Correct Answer: C