GCIH Exam Question 11
In which of the following attacks does an attacker spoof the source address in IP packets that are sent to the victim?
GCIH Exam Question 12
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are
working as a root user on the Linux operating system. Your company is facing an IP spoofing attack. Which of the
following tools will you use to get an alert saying that an upcoming IP packet is being spoofed?
working as a root user on the Linux operating system. Your company is facing an IP spoofing attack. Which of the
following tools will you use to get an alert saying that an upcoming IP packet is being spoofed?
GCIH Exam Question 13
Which of the following is used to determine the operating system on the remote computer in a network
environment?
environment?
GCIH Exam Question 14
You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution?
Each correct answer represents a part of the solution. Choose all that apply.
Each correct answer represents a part of the solution. Choose all that apply.
GCIH Exam Question 15
Address Resolution Protocol (ARP) spoofing, also known as ARP poisoning or ARP Poison Routing (APR), is a technique
used to attack an Ethernet wired or wireless network. ARP spoofing may allow an attacker to sniff data frames on a
local area network (LAN), modify the traffic, or stop the traffic altogether. The principle of ARP spoofing is to send fake
ARP messages to an Ethernet LAN. What steps can be used as a countermeasure of ARP spoofing?
Each correct answer represents a complete solution. Choose all that apply.
used to attack an Ethernet wired or wireless network. ARP spoofing may allow an attacker to sniff data frames on a
local area network (LAN), modify the traffic, or stop the traffic altogether. The principle of ARP spoofing is to send fake
ARP messages to an Ethernet LAN. What steps can be used as a countermeasure of ARP spoofing?
Each correct answer represents a complete solution. Choose all that apply.