GCIH Exam Question 161

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?
  • GCIH Exam Question 162

    John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-
    secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure
    server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following
    scanning techniques will John use to accomplish his task?
  • GCIH Exam Question 163

    John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.
    Original cookie values:
    ItemID1=2 ItemPrice1=900 ItemID2=1 ItemPrice2=200
    Modified cookie values:
    ItemID1=2 ItemPrice1=1 ItemID2=1 ItemPrice2=1 Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.
    Which of the following hacking techniques is John performing?
  • GCIH Exam Question 164

    What is the major difference between a worm and a Trojan horse?
  • GCIH Exam Question 165

    Which of the following functions can be used as a countermeasure to a Shell Injection attack?
    Each correct answer represents a complete solution. Choose all that apply.