GCIH Exam Question 191
Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?
GCIH Exam Question 192
Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP
packet once reconstructed is over 65,536 bytes. On the basis of above information, which of the following types of
attack is Adam attempting to perform?
packet once reconstructed is over 65,536 bytes. On the basis of above information, which of the following types of
attack is Adam attempting to perform?
GCIH Exam Question 193
John works as a C programmer. He develops the following C program:
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
int buffer(char *str) {
char buffer1[10];
strcpy(buffer1, str);
return 1;
}
int main(int argc, char *argv[]) {
buffer (argv[1]);
printf("Executed\n");
return 1;
}
His program is vulnerable to a __________ attack.
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
int buffer(char *str) {
char buffer1[10];
strcpy(buffer1, str);
return 1;
}
int main(int argc, char *argv[]) {
buffer (argv[1]);
printf("Executed\n");
return 1;
}
His program is vulnerable to a __________ attack.
GCIH Exam Question 194
Which of the following are based on malicious code?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
GCIH Exam Question 195
Which of the following protocols is a maintenance protocol and is normally considered a part of the IP layer, but has also been used to conduct denial-of-service attacks?