GCIH Exam Question 86
Which of the following statements are true regarding SYN flood attack?
GCIH Exam Question 87
Which of the following HTTP requests is the SQL injection attack?
GCIH Exam Question 88
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The company has three Windows 2008 file servers, 150 Windows XP Professional, thirty UNIX-based client computers. The network users have identical user accounts for both Active Directory and the UNIX realm. You want to ensure that the UNIX clients on the network can access the file servers. You also want to ensure that the users are able to access all resources by logging on only once, and that no additional software is installed on the UNIX clients. What will you do to accomplish this task?
Each correct answer represents a part of the solution. Choose two.
Each correct answer represents a part of the solution. Choose two.
GCIH Exam Question 89
Which of the following statements about Ping of Death attack is true?
GCIH Exam Question 90
Mark works as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The
company uses Check Point SmartDefense to provide security to the network. Mark uses SmartDefense on the HTTP
servers of the company to fix the limitation for the maximum response header length. Which of the following attacks
can be blocked by defining this limitation?
company uses Check Point SmartDefense to provide security to the network. Mark uses SmartDefense on the HTTP
servers of the company to fix the limitation for the maximum response header length. Which of the following attacks
can be blocked by defining this limitation?