GCIH Exam Question 151
Buffer overflows are one of the major errors used for exploitation on the Internet today. A buffer overflow occurs
when a particular operation/function writes more data into a variable than the variable was designed to hold.
Which of the following are the two popular types of buffer overflows?
Each correct answer represents a complete solution. Choose two.
when a particular operation/function writes more data into a variable than the variable was designed to hold.
Which of the following are the two popular types of buffer overflows?
Each correct answer represents a complete solution. Choose two.
GCIH Exam Question 152
Which of the following tools can be used to perform brute force attack on a remote database?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
GCIH Exam Question 153
When you conduct the XMAS scanning using Nmap, you find that most of the ports scanned do not give a response. What can be the state of these ports?
GCIH Exam Question 154
John works as an Ethical Hacker for PassGuide Inc. He wants to find out the ports that are open in PassGuide's server
using a port scanner. However, he does not want to establish a full TCP connection.
Which of the following scanning techniques will he use to accomplish this task?
using a port scanner. However, he does not want to establish a full TCP connection.
Which of the following scanning techniques will he use to accomplish this task?
GCIH Exam Question 155
Which of the following applications is an example of a data-sending Trojan?