GCIH Exam Question 71

Which of the following statements are correct about spoofing and session hijacking?
Each correct answer represents a complete solution. Choose all that apply.
  • GCIH Exam Question 72

    Which of the following threats is a combination of worm, virus, and Trojan horse characteristics?
  • GCIH Exam Question 73

    John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?
  • GCIH Exam Question 74

    Brutus is a password cracking tool that can be used to crack the following authentications:
    l HTTP (Basic Authentication) l HTTP (HTML Form/CGI) l POP3 (Post Office Protocol v3) l FTP (File Transfer Protocol) l SMB (Server Message Block) l Telnet
    Which of the following attacks can be performed by Brutus for password cracking? Each correct answer represents a complete solution. Choose all that apply.
  • GCIH Exam Question 75

    Which of the following statements about buffer overflow are true?
    Each correct answer represents a complete solution. Choose two.