GCIH Exam Question 131

You see the career section of a company's Web site and analyze the job profile requirements. You conclude that the company wants professionals who have a sharp knowledge of Windows server 2003 and Windows active directory installation and placement. Which of the following steps are you using to perform hacking?
  • GCIH Exam Question 132

    Which of the following attacking methods allows the bypassing of access control lists on servers or routers, either hiding a computer on a network or allowing it to impersonate another computer by changing the Media Access Control address?
  • GCIH Exam Question 133

    Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com.
    She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the
    ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request
    traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server.
    Which of the following DoS attacks is Maria using to accomplish her task?
  • GCIH Exam Question 134

    Which of the following is a type of computer security vulnerability typically found in Web applications that allow code
    injection by malicious Web users into the Web pages viewed by other users?
  • GCIH Exam Question 135

    Mark works as a Network Administrator for NetTech Inc. The network has 150 Windows 2000 Professional client computers and four Windows 2000 servers. All the client computers are able to connect to the Internet.
    Mark is concerned about malware infecting the client computers through the Internet. What will Mark do to protect the client computers from malware?
    Each correct answer represents a complete solution. Choose two.