GCIH Exam Question 21

Which of the following ensures that the investigation process of incident response team does not break any laws during the response to an incident?
  • GCIH Exam Question 22

    Which of the following types of attacks come under the category of hacker attacks?
    Each correct answer represents a complete solution. Choose all that apply.
  • GCIH Exam Question 23

    Which of the following US Acts emphasized a "risk-based policy for cost-effective security" and makes mandatory for agency program officials, chief information officers, and inspectors general (IGs) to conduct annual reviews of the agency's information security program and report the results to Office of Management and Budget?
  • GCIH Exam Question 24

    Which of the following tools can be used for network sniffing as well as for intercepting conversations through session hijacking?
  • GCIH Exam Question 25

    Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking on the server of
    DataSoft Inc. to hone his hacking skills. The company has a Windows-based network. Jason successfully enters the
    target system remotely by using the advantage of vulnerability. He places a Trojan to maintain future access and then
    disconnects the remote session. The employees of the company complain to Mark, who works as a Professional
    Ethical Hacker for DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that some
    irrelevant log files and signs of Trojans are present on the computers. He suspects that a malicious hacker has
    accessed the network. Mark takes the help from Forensic Investigators and catches Jason.
    Which of the following mistakes made by Jason helped the Forensic Investigators catch him?