GCIH Exam Question 151

Buffer overflows are one of the major errors used for exploitation on the Internet today. A buffer overflow occurs
when a particular operation/function writes more data into a variable than the variable was designed to hold.
Which of the following are the two popular types of buffer overflows?
Each correct answer represents a complete solution. Choose two.
  • GCIH Exam Question 152

    Which of the following tools can be used to perform brute force attack on a remote database?
    Each correct answer represents a complete solution. Choose all that apply.
  • GCIH Exam Question 153

    When you conduct the XMAS scanning using Nmap, you find that most of the ports scanned do not give a response. What can be the state of these ports?
  • GCIH Exam Question 154

    John works as an Ethical Hacker for PassGuide Inc. He wants to find out the ports that are open in PassGuide's server
    using a port scanner. However, he does not want to establish a full TCP connection.
    Which of the following scanning techniques will he use to accomplish this task?
  • GCIH Exam Question 155

    Which of the following applications is an example of a data-sending Trojan?