اختبار شهادة Certified Ethical Hacker (CEH) V13

السؤال 89 من 90

كل الأسئلة

A network administrator discovers several unknown files in the root directory of a Linux FTP server: a tarball, two shell scripts, and a binary named "nc". Logs show the anonymous user uploaded the files, extracted the tarball, and executed a script via a function provided by the FTP software. The "nc" process is now running and listening on a network port. Which kind of vulnerability must be present to make this remote attack possible?

الخيارات

  • A File system permissions
  • B Privilege escalation
  • C Directory traversal
  • D Brute force login

النقاشات

لا توجد نقاشات منشورة لهذا السؤال حالياً.