GCIH Exam Question 231
Mark works as a Network Administrator for Perfect Inc. The company has both wired and wireless networks. An
attacker attempts to keep legitimate users from accessing services that they require. Mark uses IDS/IPS sensors on the
wired network to mitigate the attack. Which of the following attacks best describes the attacker's intentions?
attacker attempts to keep legitimate users from accessing services that they require. Mark uses IDS/IPS sensors on the
wired network to mitigate the attack. Which of the following attacks best describes the attacker's intentions?
GCIH Exam Question 232
You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. Your company is facing an IP spoofing attack.
Which of the following tools will you use to get an alert saying that an upcoming IP packet is being spoofed?
Which of the following tools will you use to get an alert saying that an upcoming IP packet is being spoofed?
GCIH Exam Question 233
John works as a Penetration Tester in a security service providing firm named you-are-secure Inc. Recently, John's company has got a project to test the security of a promotional Website www.missatlanta.com and assigned the pen-testing work to John. When John is performing penetration testing, he inserts the following script in the search box at the company home page:
<script>alert('Hi, John')</script>
After pressing the search button, a pop-up box appears on his screen with the text - "Hi, John." Which of the following attacks can be performed on the Web site tested by john while considering the above scenario?
<script>alert('Hi, John')</script>
After pressing the search button, a pop-up box appears on his screen with the text - "Hi, John." Which of the following attacks can be performed on the Web site tested by john while considering the above scenario?
GCIH Exam Question 234
Which of the following types of skills are required in the members of an incident handling team?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
GCIH Exam Question 235
Which of the following is the difference between SSL and S-HTTP?