GCIH Exam Question 76
Which of the following statements is true about the difference between worms and Trojan horses?
GCIH Exam Question 77
Buffer overflows are one of the major errors used for exploitation on the Internet today. A buffer overflow occurs when a particular operation/function writes more data into a variable than the variable was designed to hold.
Which of the following are the two popular types of buffer overflows?
Each correct answer represents a complete solution. Choose two.
Which of the following are the two popular types of buffer overflows?
Each correct answer represents a complete solution. Choose two.
GCIH Exam Question 78
Which of the following statements about a Trojan horse are true?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
GCIH Exam Question 79
You have inserted a Trojan on your friend's computer and you want to put it in the startup so that whenever the
computer reboots the Trojan will start to run on the startup. Which of the following registry entries will you edit to
accomplish the task?
computer reboots the Trojan will start to run on the startup. Which of the following registry entries will you edit to
accomplish the task?
GCIH Exam Question 80
Which of the following types of malware does not replicate itself but can spread only when the
circumstances are beneficial?
circumstances are beneficial?