GCIH Exam Question 16
Which of the following threats is a combination of worm, virus, and Trojan horse characteristics?
GCIH Exam Question 17
Adam, a malicious hacker, wants to perform a reliable scan against a remote target. He is not concerned about being stealth at this point.
Which of the following type of scans would be most accurate and reliable?
Which of the following type of scans would be most accurate and reliable?
GCIH Exam Question 18
CORRECT TEXT
Fill in the blank with the appropriate option to complete the statement below.
You want to block all UDP packets coming to the Linux server using the portsentry utility. For this, you have to enable the ______ option in the portsentry configuration file.
Fill in the blank with the appropriate option to complete the statement below.
You want to block all UDP packets coming to the Linux server using the portsentry utility. For this, you have to enable the ______ option in the portsentry configuration file.
GCIH Exam Question 19
Which of the following statements about reconnaissance is true?
GCIH Exam Question 20
In which of the following attacks does an attacker create the IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system?