You are the chief information officer for yuor company, a shipping company based out of Oklahoma City. You are responsible for network security throughout the home office and all branch offices. You have implemented numerous layers of security from logical to physical. As part of your procedures, you perform a yearly network assessment which includesa vulnerability analysis internal network scanning, and external penetration tests. Your main concern currently is the server in the DMZ hosts a number of company websites. To see how the server appears to external users, you log onto a laptop at a Wi-Fi hotspot. Since you already know the IP address of the web server, you create a telnet session to that server and type in the command:
HEAD /HTTP/1.0
After typing in this command, you are presented with the following screen:
What are you trying to do here?
A.
You are trying to grab the banner of the web server.
B.
You are attempting to send an html file over port 25 to the web server.
C.
You are trying to open a remote shell to the web server.
D.
By typing in the HEAD command, you are attempting to create a buffer overflow on the web server.
I agree with the answer.