GCIH Exam Question 136
Adam, a malicious hacker is sniffing the network to inject ARP packets. He injects broadcast frames onto the wire to conduct Man-in-The-Middle attack.
Which of the following is the destination MAC address of a broadcast frame?
Which of the following is the destination MAC address of a broadcast frame?
GCIH Exam Question 137
CORRECT TEXT
Fill in the blank with the appropriate name of the attack.
______ takes best advantage of an existing authenticated connection
Fill in the blank with the appropriate name of the attack.
______ takes best advantage of an existing authenticated connection
GCIH Exam Question 138
SIMULATION
Fill in the blank with the appropriate name of the attack.
______ takes best advantage of an existing authenticated connection
Fill in the blank with the appropriate name of the attack.
______ takes best advantage of an existing authenticated connection
GCIH Exam Question 139
Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to secure access to the
network of the company from all possible entry points. He segmented the network into several subnets and installed
firewalls all over the network. He has placed very stringent rules on all the firewalls, blocking everything in and out
except the ports that must be used. He does need to have port 80 open since his company hosts a website that must
be accessed from the Internet. Adam is still worried about the programs like GIACing2 that can get into a network
through covert channels.
Which of the following is the most effective way to protect the network of the company from an attacker using
GIACing2 to scan his internal network?
network of the company from all possible entry points. He segmented the network into several subnets and installed
firewalls all over the network. He has placed very stringent rules on all the firewalls, blocking everything in and out
except the ports that must be used. He does need to have port 80 open since his company hosts a website that must
be accessed from the Internet. Adam is still worried about the programs like GIACing2 that can get into a network
through covert channels.
Which of the following is the most effective way to protect the network of the company from an attacker using
GIACing2 to scan his internal network?
GCIH Exam Question 140
Which of the following is a network worm that exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system?