GCIH Exam Question 216

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following steps of the pre-attack phase:
l Information gathering
l Determining network range
l Identifying active machines
l Finding open ports and applications
l OS fingerprinting
l Fingerprinting services
Now John wants to perform network mapping of the We-are-secure network. Which of the following tools can he use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.
  • GCIH Exam Question 217

    Which of the following statements are true about session hijacking?
    Each correct answer represents a complete solution. Choose all that apply.
  • GCIH Exam Question 218

    Which of the following programs is used for bypassing normal authentication for securing remote access to a computer?
  • GCIH Exam Question 219

    Which of the following are the rules by which an organization operates?
  • GCIH Exam Question 220

    Which of the following tools uses common UNIX/Linux tools like the strings and grep commands to search core system programs for signatures of the rootkits?