GCIH Exam Question 171

Which of the following protocols is a maintenance protocol and is normally considered a part of the IP layer, but has
also been used to conduct denial-of-service attacks
  • GCIH Exam Question 172

    You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. Your company is facing an IP spoofing attack.
    Which of the following tools will you use to get an alert saying that an upcoming IP packet is being spoofed?
  • GCIH Exam Question 173

    Which of the following hacking tools provides shell access over ICMP?
  • GCIH Exam Question 174

    CORRECT TEXT
    Fill in the blank with the appropriate term.
    ______ is a free Unix subsystem that runs on top of Windows.

    GCIH Exam Question 175

    Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?