GCIH Exam Question 176

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?
  • GCIH Exam Question 177

    Which of the following statements are true about session hijacking?
    Each correct answer represents a complete solution. Choose all that apply.
  • GCIH Exam Question 178

    You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. An attacker uses software that keeps trying password combinations until the correct password is found. Which type of attack is this?
  • GCIH Exam Question 179

    You are responsible for security at a company that uses a lot of Web applications. You are most concerned about flaws in those applications allowing some attacker to get into your network. What method would be best for finding such flaws?
  • GCIH Exam Question 180

    Which of the following scanning tools is also a network analysis tool that sends packets with nontraditional IP stack parameters and allows the scanner to gather information from the response packets generated?