GCIH Exam Question 51

Many organizations create network maps of their network system to visualize the network and understand the
relationship between the end devices and the transport layer that provide services.
Which of the following are the techniques used for network mapping by large organizations?
Each correct answer represents a complete solution. Choose three.
  • GCIH Exam Question 52

    Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?
    Each correct answer represents a complete solution. Choose all that apply.
  • GCIH Exam Question 53

    Which of the following applications is an example of a data-sending Trojan?
  • GCIH Exam Question 54

    John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?
  • GCIH Exam Question 55

    Adam, a malicious hacker is running a scan. Statistics of the scan is as follows:
    Scan directed at open port: ClientServer
    192.5.2.92:4079 ---------FIN--------->192.5.2.110:23192.5.2.92:4079 <----NO RESPONSE---
    ---192.5.2.110:23
    Scan directed at closed port:
    ClientServer
    192.5.2.92:4079 ---------FIN--------->192.5.2.110:23
    192.5.2.92:4079<-----RST/ACK----------192.5.2.110:23
    Which of the following types of port scan is Adam running?