Certified Ethical Hacker (CEHv9) Questions and answers
119. What is the most common method to exploit the "Bash Bug" or "ShellShock" vulnerability?
A. Manipulate format strings in text fields
B. Through Web servers utilizing CGI (Common Gateway Interface) to send a malformed environment variable to a vulnerable Web server
C. SYN Flood
120. This international organization regulates billions of transactions daily and provides security guidelines to protect personally identifiable information (PII).
These security controls provide a baseline and prevent low-level hackers sometimes known as script kiddies from causing a data breach.
Which of the following organizations is being described?
A. Center for Disease Control (CDC)
B. Institute of Electrical and Electronics Engineers (IEEE)
C. International Security Industry Organization (ISIO)