GCIH Exam Question 196
Which of the following programming languages are NOT vulnerable to buffer overflow attacks?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
GCIH Exam Question 197
Which of the following is a type of computer security vulnerability typically found in Web applications that allow code injection by malicious Web users into the Web pages viewed by other users?
GCIH Exam Question 198
A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a
computer or network. It is also known as network saturation attack or bandwidth consumption attack. Attackers
perform DoS attacks by sending a large number of protocol packets to a network. The problems caused by a DoS
attack are as follows:
* Saturation of network resources
* Disruption of connections between two computers, thereby preventing communications between services
* Disruption of services to a specific computer
* Failure to access a Web site
* Increase in the amount of spam
Which of the following can be used as countermeasures against DoS attacks?
Each correct answer represents a complete solution. Choose all that apply.
computer or network. It is also known as network saturation attack or bandwidth consumption attack. Attackers
perform DoS attacks by sending a large number of protocol packets to a network. The problems caused by a DoS
attack are as follows:
* Saturation of network resources
* Disruption of connections between two computers, thereby preventing communications between services
* Disruption of services to a specific computer
* Failure to access a Web site
* Increase in the amount of spam
Which of the following can be used as countermeasures against DoS attacks?
Each correct answer represents a complete solution. Choose all that apply.
GCIH Exam Question 199
Which of the following netcat parameters makes netcat a listener that automatically restarts itself when a connection is dropped?
GCIH Exam Question 200
Who are the primary victims of smurf attacks on the contemporary Internet system?