Skip to content

Certified Ethical Hacker v11 312-50v11

  • Certified Ethical Hacker v11 312-50v11

Tag: Question 276

Certified Ethical Hacker v11 312-50v11 – Question276

What is the most common method to exploit the "Bash Bug" or "Shellshock" vulnerability?

A.
SYN Flood
B. SSH
C. Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server
D. Manipulate format strings in text fields

Correct Answer: C

Tagged Certified Ethical Hacker v11 312-50v11, Question 276
Download all the questions as a printable PDF file from here
Exam Practice Tests

Please disable your adblocker or whitelist this site!