Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
What is the most common method to exploit the shellshock vulnerability?
CGI
String Manipulation
Syn Flood
Telnet
The correct answer is CGI (Common Gateway Interface). "The most common being web servers using CGI environment.”
On down in the Symantec article mentioned below says “The most likely avenue of attack against OS X would probably be through Secure Shell (SSH)…” – Question did not say “against OS X,” so that’s why it’s not SSH.
http://blog.trendmicro.com/trendlabs-security-intelligence/shell-attack-on-your-server-bash-bug-cve-2014-7169-and-cve-2014-6271/ http://www.symantec.com/connect/blogs/shellshock-all-you-need-know-about-bash-bug-vulnerability-0
*** 3/17/2017 Answer changed to SSH***
EDIT on 4/6/2017: I read both of the articles sited above and, to me, it would appear that CGI is the better answer. I am not changing the answer but would suggest reading the articles.
Changed answer to CGI and changed possible answer from SSH to telnet to remove ambiguity.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.