GCIH Exam Question 201

John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit.
John's password is vulnerable to which of the following password cracking attacks?
Each correct answer represents a complete solution. Choose all that apply.
  • GCIH Exam Question 202

    Which of the following is used to determine the operating system on the remote computer in a network environment?
  • GCIH Exam Question 203

    Which of the following incident response team members ensures that the policies of the organization are enforced
    during the incident response?
  • GCIH Exam Question 204

    Choose the correct six-step process of threat modeling from the list of different steps.

    GCIH Exam Question 205

    Who are the primary victims of smurf attacks on the contemporary Internet system?