GCIH Exam Question 156

Which of the following netcat parameters makes netcat a listener that automatically restarts itself when a connection
is dropped?
  • GCIH Exam Question 157

    Which of the following is a computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic?
  • GCIH Exam Question 158

    You work as a professional Ethical Hacker. You are assigned a project to test the security of www.weare-secure.com. You somehow enter in we-are-secure Inc. main server, which is Windows based.
    While you are installing the NetCat tool as a backdoor in the we-are-secure server, you see the file credit.dat having the list of credit card numbers of the company's employees. You want to transfer the credit.dat file in your local computer so that you can sell that information on the internet in the good price. However, you do not want to send the contents of this file in the clear text format since you do not want that the Network Administrator of the we-are-secure Inc. can get any clue of the hacking attempt. Hence, you decide to send the content of the credit.dat file in the encrypted format.
    What steps should you take to accomplish the task?
  • GCIH Exam Question 159

    You are responsible for security at a company that uses a lot of Web applications. You are most concerned about flaws
    in those applications allowing some attacker to get into your network. What method would be best for finding such
    flaws?
  • GCIH Exam Question 160

    Mark works as a Network Administrator for Perfect Inc. The company has both wired and wireless networks. An attacker attempts to keep legitimate users from accessing services that they require. Mark uses IDS/IPS sensors on the wired network to mitigate the attack. Which of the following attacks best describes the attacker's intentions?