GCIH Exam Question 246
Which of the following virus is a script that attaches itself to a file or template?
GCIH Exam Question 247
As a professional hacker, you want to crack the security of secureserver.com. For this, in the information gathering step, you performed scanning with the help of nmap utility to retrieve as many different protocols as possible being used by the secureserver.com so that you could get the accurate knowledge about what services were being used by the secure server.com. Which of the following nmap switches have you used to accomplish the task?
GCIH Exam Question 248
You discover that your network routers are being flooded with broadcast packets that have the return address of one
of the servers on your network. This is resulting in an overwhelming amount of traffic going back to that server and
flooding it. What is this called?
of the servers on your network. This is resulting in an overwhelming amount of traffic going back to that server and
flooding it. What is this called?
GCIH Exam Question 249
An attacker sends a large number of packets to a target computer that causes denial of service.
Which of the following type of attacks is this?
Which of the following type of attacks is this?
GCIH Exam Question 250
CORRECT TEXT
Fill in the blank with the appropriate name of the rootkit.
A _______ rootkit uses device or platform firmware to create a persistent malware image.
Fill in the blank with the appropriate name of the rootkit.
A _______ rootkit uses device or platform firmware to create a persistent malware image.