GCIH Exam Question 246

Which of the following virus is a script that attaches itself to a file or template?
  • GCIH Exam Question 247

    As a professional hacker, you want to crack the security of secureserver.com. For this, in the information gathering step, you performed scanning with the help of nmap utility to retrieve as many different protocols as possible being used by the secureserver.com so that you could get the accurate knowledge about what services were being used by the secure server.com. Which of the following nmap switches have you used to accomplish the task?
  • GCIH Exam Question 248

    You discover that your network routers are being flooded with broadcast packets that have the return address of one
    of the servers on your network. This is resulting in an overwhelming amount of traffic going back to that server and
    flooding it. What is this called?
  • GCIH Exam Question 249

    An attacker sends a large number of packets to a target computer that causes denial of service.
    Which of the following type of attacks is this?
  • GCIH Exam Question 250

    CORRECT TEXT
    Fill in the blank with the appropriate name of the rootkit.
    A _______ rootkit uses device or platform firmware to create a persistent malware image.