GCIH Exam Question 126

Which of the following ensures that the investigation process of incident response team does not break any laws
during the response to an incident?
  • GCIH Exam Question 127

    Which of the following characters will you use to check whether an application is vulnerable to an SQL injection attack?
  • GCIH Exam Question 128

    The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook's preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?
  • GCIH Exam Question 129

    John works as a Network Administrator for Net Perfect Inc. The company has a Windows-based network.
    The company uses Check Point SmartDefense to provide security to the network of the company. On the HTTP servers of the company, John defines a rule for dropping any kind of userdefined URLs. Which of the following types of attacks can be prevented by dropping the user-defined URLs?
  • GCIH Exam Question 130

    You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you
    use?