GCIH Exam Question 196

Which of the following programming languages are NOT vulnerable to buffer overflow attacks?
Each correct answer represents a complete solution. Choose two.
  • GCIH Exam Question 197

    Which of the following is a type of computer security vulnerability typically found in Web applications that allow code injection by malicious Web users into the Web pages viewed by other users?
  • GCIH Exam Question 198

    A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a
    computer or network. It is also known as network saturation attack or bandwidth consumption attack. Attackers
    perform DoS attacks by sending a large number of protocol packets to a network. The problems caused by a DoS
    attack are as follows:
    * Saturation of network resources
    * Disruption of connections between two computers, thereby preventing communications between services
    * Disruption of services to a specific computer
    * Failure to access a Web site
    * Increase in the amount of spam
    Which of the following can be used as countermeasures against DoS attacks?
    Each correct answer represents a complete solution. Choose all that apply.
  • GCIH Exam Question 199

    Which of the following netcat parameters makes netcat a listener that automatically restarts itself when a connection is dropped?
  • GCIH Exam Question 200

    Who are the primary victims of smurf attacks on the contemporary Internet system?