GCIH Exam Question 136

Adam, a malicious hacker is sniffing the network to inject ARP packets. He injects broadcast frames onto the wire to conduct Man-in-The-Middle attack.
Which of the following is the destination MAC address of a broadcast frame?
  • GCIH Exam Question 137

    CORRECT TEXT
    Fill in the blank with the appropriate name of the attack.
    ______ takes best advantage of an existing authenticated connection

    GCIH Exam Question 138

    SIMULATION
    Fill in the blank with the appropriate name of the attack.
    ______ takes best advantage of an existing authenticated connection

    GCIH Exam Question 139

    Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to secure access to the
    network of the company from all possible entry points. He segmented the network into several subnets and installed
    firewalls all over the network. He has placed very stringent rules on all the firewalls, blocking everything in and out
    except the ports that must be used. He does need to have port 80 open since his company hosts a website that must
    be accessed from the Internet. Adam is still worried about the programs like GIACing2 that can get into a network
    through covert channels.
    Which of the following is the most effective way to protect the network of the company from an attacker using
    GIACing2 to scan his internal network?
  • GCIH Exam Question 140

    Which of the following is a network worm that exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system?