GCIH Exam Question 41

Which of the following attacks is specially used for cracking a password?
  • GCIH Exam Question 42

    Which of the following are based on malicious code?
    Each correct answer represents a complete solution. Choose two.
  • GCIH Exam Question 43

    An Active Attack is a type of steganography attack in which the attacker changes the carrier during the communication process. Which of the following techniques is used for smoothing the transition and controlling contrast on the hard edges, where there is significant color transition?
  • GCIH Exam Question 44

    In which of the following attacks does an attacker create the IP packets with a forged (spoofed) source IP address with
    the purpose of concealing the identity of the sender or impersonating another computing system?
  • GCIH Exam Question 45

    Which of the following is designed to protect the Internet resolvers (clients) from forged DNS data created by DNS cache poisoning?