ExamGecko
Question list
Search
Search

Related questions











Question 381 - 312-50v12 discussion

Report
Export

What is the most common method to exploit the "Bash Bug" or "Shellshock" vulnerability?

A.
SYN Flood
Answers
A.
SYN Flood
B.
SSH
Answers
B.
SSH
C.
Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server
Answers
C.
Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server
D.
Manipulate format strings in text fields
Answers
D.
Manipulate format strings in text fields
Suggested answer: C
asked 18/09/2024
leonie lira
39 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first