GCIH Exam Question 251
Which of the following controls is described in the statement given below?
"It ensures that the enforcement of organizational security policy does not rely on voluntary web application user compliance. It secures information by assigning sensitivity labels on information and comparing this to the level of security a user is operating at."
"It ensures that the enforcement of organizational security policy does not rely on voluntary web application user compliance. It secures information by assigning sensitivity labels on information and comparing this to the level of security a user is operating at."
GCIH Exam Question 252
John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-based network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the company complains to John that his system contains an unknown package named as tar.gz and his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that the other computers on the network are also facing the same problem. John discovers that a malicious application is using the synscan tool to randomly generate IP addresses.
Which of the following worms has attacked the computer?
Which of the following worms has attacked the computer?
GCIH Exam Question 253
Which of the following functions in c/c++ can be the cause of buffer overflow?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
GCIH Exam Question 254
Which of the following types of malware does not replicate itself but can spread only when the circumstances are beneficial?
GCIH Exam Question 255
Which of the following rootkits adds additional code or replaces portions of an operating system, including both the
kernel and associated device drivers?
kernel and associated device drivers?