GCIH Exam Question 11

In which of the following attacks does an attacker spoof the source address in IP packets that are sent to the victim?
  • GCIH Exam Question 12

    You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are
    working as a root user on the Linux operating system. Your company is facing an IP spoofing attack. Which of the
    following tools will you use to get an alert saying that an upcoming IP packet is being spoofed?
  • GCIH Exam Question 13

    Which of the following is used to determine the operating system on the remote computer in a network
    environment?
  • GCIH Exam Question 14

    You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution?
    Each correct answer represents a part of the solution. Choose all that apply.
  • GCIH Exam Question 15

    Address Resolution Protocol (ARP) spoofing, also known as ARP poisoning or ARP Poison Routing (APR), is a technique
    used to attack an Ethernet wired or wireless network. ARP spoofing may allow an attacker to sniff data frames on a
    local area network (LAN), modify the traffic, or stop the traffic altogether. The principle of ARP spoofing is to send fake
    ARP messages to an Ethernet LAN. What steps can be used as a countermeasure of ARP spoofing?
    Each correct answer represents a complete solution. Choose all that apply.