GCIH Exam Question 116
Against which of the following does SSH provide protection?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
GCIH Exam Question 117
You work as a System Engineer for Cyber World Inc. Your company has a single Active Directory domain. All servers in
the domain run Windows Server 2008. The Microsoft Hyper-V server role has been installed on one of the servers,
namely uC1. uC1 hosts twelve virtual machines. You have been given the task to configure the Shutdown option for
uC1, so that each virtual machine shuts down before the main Hyper-V server shuts down. Which of the following
actions will you perform to accomplish the task?
the domain run Windows Server 2008. The Microsoft Hyper-V server role has been installed on one of the servers,
namely uC1. uC1 hosts twelve virtual machines. You have been given the task to configure the Shutdown option for
uC1, so that each virtual machine shuts down before the main Hyper-V server shuts down. Which of the following
actions will you perform to accomplish the task?
GCIH Exam Question 118
Which of the following types of rootkits replaces regular application binaries with Trojan fakes and modifies the behavior of existing applications using hooks, patches, or injected code?
GCIH Exam Question 119
Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to secure access to the network of the company from all possible entry points. He segmented the network into several subnets and installed firewalls all over the network. He has placed very stringent rules on all the firewalls, blocking everything in and out except the ports that must be used. He does need to have port 80 open since his company hosts a website that must be accessed from the Internet. Adam is still worried about the programs like Hping2 that can get into a network through covert channels.
Which of the following is the most effective way to protect the network of the company from an attacker using Hping2 to scan his internal network?
Which of the following is the most effective way to protect the network of the company from an attacker using Hping2 to scan his internal network?
GCIH Exam Question 120
You want to add a netbus Trojan in the chess.exe game program so that you can gain remote access to a friend's
computer. Which of the following tools will you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
computer. Which of the following tools will you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.