GCIH Exam Question 186
Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms.
In order to use this tool on the Windows platform a user must install a packet capture library.
What is the name of this library?
In order to use this tool on the Windows platform a user must install a packet capture library.
What is the name of this library?
GCIH Exam Question 187
John works as a C programmer. He develops the following C program:
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
int buffer(char *str) {
char buffer1[10];
strcpy(buffer1, str);
return 1;
}
int main(int argc, char *argv[]) {
buffer (argv[1]);
printf("Executed\n");
return 1;
}
His program is vulnerable to a __________ attack.
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
int buffer(char *str) {
char buffer1[10];
strcpy(buffer1, str);
return 1;
}
int main(int argc, char *argv[]) {
buffer (argv[1]);
printf("Executed\n");
return 1;
}
His program is vulnerable to a __________ attack.
GCIH Exam Question 188
As a professional hacker, you want to crack the security of secureserver.com. For this, in the information gathering
step, you performed scanning with the help of nmap utility to retrieve as many different protocols as possible being
used by the secureserver.com so that you could get the accurate knowledge about what services were being used by
the secure server.com. Which of the following nmap switches have you used to accomplish the task?
step, you performed scanning with the help of nmap utility to retrieve as many different protocols as possible being
used by the secureserver.com so that you could get the accurate knowledge about what services were being used by
the secure server.com. Which of the following nmap switches have you used to accomplish the task?
GCIH Exam Question 189
Which of the following rootkits is able to load the original operating system as a virtual machine, thereby enabling it to intercept all hardware calls made by the original operating system?
GCIH Exam Question 190
Which of the following types of attacks is targeting a Web server with multiple compromised computers that are simultaneously sending hundreds of FIN packets with spoofed IP source IP addresses?