GCIH Exam Question 101
Which of the following are the rules by which an organization operates?
GCIH Exam Question 102
Which of the following would allow you to automatically close connections or restart a server or
service when a DoS attack is detected?
service when a DoS attack is detected?
GCIH Exam Question 103
Which of the following types of rootkits replaces regular application binaries with Trojan fakes and modifies the behavior of existing applications using hooks, patches, or injected code?
GCIH Exam Question 104
Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes. On the basis of above information, which of the following types of attack is Adam attempting to perform?
GCIH Exam Question 105
Which of the following tasks can be performed by using netcat utility?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.