GCIH Exam Question 101

Which of the following are the rules by which an organization operates?
  • GCIH Exam Question 102

    Which of the following would allow you to automatically close connections or restart a server or
    service when a DoS attack is detected?
  • GCIH Exam Question 103

    Which of the following types of rootkits replaces regular application binaries with Trojan fakes and modifies the behavior of existing applications using hooks, patches, or injected code?
  • GCIH Exam Question 104

    Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes. On the basis of above information, which of the following types of attack is Adam attempting to perform?
  • GCIH Exam Question 105

    Which of the following tasks can be performed by using netcat utility?
    Each correct answer represents a complete solution. Choose all that apply.