GCIH Exam Question 146
Which of the following malicious code can have more than one type of trigger, multiple task capabilities, and can replicate itself in more than one manner?
GCIH Exam Question 147
Which of the following techniques does an attacker use to sniff data frames on a local area network and modify the
traffic?
traffic?
GCIH Exam Question 148
Which of the following options scans the networks for vulnerabilities regarding the security of a network?
GCIH Exam Question 149
Which of the following are types of access control attacks?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
GCIH Exam Question 150
US Garments wants all encrypted data communication between corporate office and remote location.
They want to achieve following results:
l Authentication of users

l Anti-replay

l Anti-spoofing

l IP packet encryption

They implemented IPSec using Authentication Headers (AHs). Which results does this solution provide?
Each correct answer represents a complete solution. Choose all that apply.
They want to achieve following results:
l Authentication of users

l Anti-replay

l Anti-spoofing

l IP packet encryption

They implemented IPSec using Authentication Headers (AHs). Which results does this solution provide?
Each correct answer represents a complete solution. Choose all that apply.