GCIH Exam Question 146

Which of the following malicious code can have more than one type of trigger, multiple task capabilities, and can replicate itself in more than one manner?
  • GCIH Exam Question 147

    Which of the following techniques does an attacker use to sniff data frames on a local area network and modify the
    traffic?
  • GCIH Exam Question 148

    Which of the following options scans the networks for vulnerabilities regarding the security of a network?
  • GCIH Exam Question 149

    Which of the following are types of access control attacks?
    Each correct answer represents a complete solution. Choose all that apply.
  • GCIH Exam Question 150

    US Garments wants all encrypted data communication between corporate office and remote location.
    They want to achieve following results:
    l Authentication of users

    l Anti-replay

    l Anti-spoofing

    l IP packet encryption

    They implemented IPSec using Authentication Headers (AHs). Which results does this solution provide?
    Each correct answer represents a complete solution. Choose all that apply.