Which of the following attacks allows an attacker to access restricted directories, including application source code, configuration and critical system files, and to execute commands outside of the web server's root directory?
Correct : C
Start a Discussions
Microsoft Security IDs are available in Windows Registry Editor. The path to locate IDs in Windows 7 is:
Correct : A
Start a Discussions
Netstat is a tool for collecting Information regarding network connections. It provides a simple view of TCP and UDP connections, and their state and network traffic statistics.
Which of the following commands shows you the TCP and UDP network connections, listening ports, and the identifiers?
Correct : A
Start a Discussions
International Mobile Equipment Identifier (IMEI) is a 15-dlgit number that indicates the manufacturer, model type, and country of approval for GSM devices. The first eight digits of an IMEI number that provide information about the model and origin of the mobile device is also known as:
Correct : A
Start a Discussions
Damaged portions of a disk on which no read/Write operation can be performed is known as ______________.
Correct : B
Start a Discussions