GCIH Exam Question 126
Which of the following ensures that the investigation process of incident response team does not break any laws
during the response to an incident?
during the response to an incident?
GCIH Exam Question 127
Which of the following characters will you use to check whether an application is vulnerable to an SQL injection attack?
GCIH Exam Question 128
The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook's preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?
GCIH Exam Question 129
John works as a Network Administrator for Net Perfect Inc. The company has a Windows-based network.
The company uses Check Point SmartDefense to provide security to the network of the company. On the HTTP servers of the company, John defines a rule for dropping any kind of userdefined URLs. Which of the following types of attacks can be prevented by dropping the user-defined URLs?
The company uses Check Point SmartDefense to provide security to the network of the company. On the HTTP servers of the company, John defines a rule for dropping any kind of userdefined URLs. Which of the following types of attacks can be prevented by dropping the user-defined URLs?
GCIH Exam Question 130
You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you
use?
use?