During a routine security inspection of the clients in your network, you find a program called cgiscan.c on one of the computers. You investigate the file, reading part of the contents. Using the portion of the program shown below, identify the function of the program. Temp[1] = "GET /cgi-bin/phf HTTP/1.0\n\n"; Temp[2] = "GET /cgi-bin/Count.cgi HTTP/1.0\n\n"; Temp[3] = "GET /cgi-bin/test-cgi HTTP/1.0\n\n"; Temp[4] = "GET /cgi-bin/php.cgi HTTP/1.0\n\n"; Temp[5] = "GET /cgi-bin/handler HTTP/1.0\n\n"; Temp[6] = "GET /cgi-bin/webgais HTTP/1.0\n\n"; Temp[7] = "GET /cgi-bin/websendmail HTTP/1.0\n\n";
DES is often defined as no longer "secure enough" to handle high security requirements. Why is this?
Your organization assigns an Annual Loss Expectancy to assets during a risk analysis meeting. You have a server which if down for a day will lose the company $35,000, and has a serious root access attack against it once per month. What is the ALE for this attack against this server?
While configuring TCP Wrappers on your Linux system, you desire to create a line that will effect the single host 10.20.23.45 accessing the telnet service. Which of the following lines will achieve this desired result?