GCIH Exam Question 46

Which of the following are open-source vulnerability scanners?
  • GCIH Exam Question 47

    Which of the following takes control of a session between a server and a client using TELNET, FTP, or any other non-encrypted TCP/IP utility?
  • GCIH Exam Question 48

    Which of the following statements is true about the difference between worms and Trojan horses?
  • GCIH Exam Question 49

    Which of the following statements about Ping of Death attack is true?
  • GCIH Exam Question 50

    Which of the following is used to gather information about a remote network protected by a firewall?