GCIH Exam Question 221

Which of the following attacks is specially used for cracking a password?
  • GCIH Exam Question 222

    Which of the following statements about smurf is true?
  • GCIH Exam Question 223

    Which of the following applications is NOT used for passive OS fingerprinting?
  • GCIH Exam Question 224

    Which of the following attacks can be overcome by applying cryptography?
  • GCIH Exam Question 225

    You work as a System Administrator for Happy World Inc. Your company has a server named uC1 that runs Windows Server 2008. The Windows Server virtualization role service is installed on the uC1 server which hosts one virtual machine that also runs Windows Server 2008. You are required to install a new application on the virtual machine. You need to ensure that in case of a failure of the application installation, you are able to quickly restore the virtual machine to its original state.
    Which of the following actions will you perform to accomplish the task?