Which of the following is a potential security risk when using CGI scripts?
A.
CGI scripts can contain viruses that can be used against your system.
B.
Compromised CGI scripts are often used in packet spoofing because they do not check packets that generate.
C.
CGI scripts can create broadcast storms on the local network.
D.
Remote user input can be used to execute local commands.
Explanation:
CGI scripts are program executables capable of executing programs. A hacker could subvert the system and execute programs that might allow command execution.
Incorrect Answers:
A: Although this is a possibility, CGI scripts could be installed if only secure, for example only internal written CGI scripts, or making sure they are from reliable sources. In other words, you can be careful of what CGI scripts you install. The CGI script having viruses would not be a concern unless there was a method in place to upload new CGI modules. Since CGI scripts are used in HTTP, and HTTP usually does not provide upload facilities, having someone slip in a virus in a CGI module will be rare and difficult.
B: CGI scripts run at the HTTP level, which is an Application protocol. To spoof packets, where the IP addressees in the packet are altered, has to be done at lower layers in the protocol stack.
C: CGI scripts run at the HTTP level, which is an Application protocol. To cause a 1D0-470
broadcast storm will require modification of the addresses in the packet and frame and has to be done at lower layers in the protocol stack.