GCIH Exam Question 41
Which of the following attacks is specially used for cracking a password?
GCIH Exam Question 42
Which of the following are based on malicious code?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
GCIH Exam Question 43
An Active Attack is a type of steganography attack in which the attacker changes the carrier during the communication process. Which of the following techniques is used for smoothing the transition and controlling contrast on the hard edges, where there is significant color transition?
GCIH Exam Question 44
In which of the following attacks does an attacker create the IP packets with a forged (spoofed) source IP address with
the purpose of concealing the identity of the sender or impersonating another computing system?
the purpose of concealing the identity of the sender or impersonating another computing system?
GCIH Exam Question 45
Which of the following is designed to protect the Internet resolvers (clients) from forged DNS data created by DNS cache poisoning?