- (Topic 2)
You execute the following netcat command:
c:targetnc -1 -p 53 -d -e cmd.exe
What action do you want to perform by issuing the above command?
Correct Answer:
C
- (Topic 3)
Which of the following characters will you use to check whether an application is vulnerable to an SQL injection attack?
Correct Answer:
A
- (Topic 4)
How many bits encryption does SHA-1 use?
Correct Answer:
D
- (Topic 1)
How can a non-privileged user on a Unix system determine if shadow passwords are being used?
Correct Answer:
B
- (Topic 2)
What is the sequence in which packets are sent when establishing a connection to a secured network?
Correct Answer:
C