GCIH Exam Question 86

Which of the following statements are true regarding SYN flood attack?
  • GCIH Exam Question 87

    Which of the following HTTP requests is the SQL injection attack?
  • GCIH Exam Question 88

    You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The company has three Windows 2008 file servers, 150 Windows XP Professional, thirty UNIX-based client computers. The network users have identical user accounts for both Active Directory and the UNIX realm. You want to ensure that the UNIX clients on the network can access the file servers. You also want to ensure that the users are able to access all resources by logging on only once, and that no additional software is installed on the UNIX clients. What will you do to accomplish this task?
    Each correct answer represents a part of the solution. Choose two.
  • GCIH Exam Question 89

    Which of the following statements about Ping of Death attack is true?
  • GCIH Exam Question 90

    Mark works as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The
    company uses Check Point SmartDefense to provide security to the network. Mark uses SmartDefense on the HTTP
    servers of the company to fix the limitation for the maximum response header length. Which of the following attacks
    can be blocked by defining this limitation?