GCIH Exam Question 21
Which of the following ensures that the investigation process of incident response team does not break any laws during the response to an incident?
GCIH Exam Question 22
Which of the following types of attacks come under the category of hacker attacks?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
GCIH Exam Question 23
Which of the following US Acts emphasized a "risk-based policy for cost-effective security" and makes mandatory for agency program officials, chief information officers, and inspectors general (IGs) to conduct annual reviews of the agency's information security program and report the results to Office of Management and Budget?
GCIH Exam Question 24
Which of the following tools can be used for network sniffing as well as for intercepting conversations through session hijacking?
GCIH Exam Question 25
Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking on the server of
DataSoft Inc. to hone his hacking skills. The company has a Windows-based network. Jason successfully enters the
target system remotely by using the advantage of vulnerability. He places a Trojan to maintain future access and then
disconnects the remote session. The employees of the company complain to Mark, who works as a Professional
Ethical Hacker for DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that some
irrelevant log files and signs of Trojans are present on the computers. He suspects that a malicious hacker has
accessed the network. Mark takes the help from Forensic Investigators and catches Jason.
Which of the following mistakes made by Jason helped the Forensic Investigators catch him?
DataSoft Inc. to hone his hacking skills. The company has a Windows-based network. Jason successfully enters the
target system remotely by using the advantage of vulnerability. He places a Trojan to maintain future access and then
disconnects the remote session. The employees of the company complain to Mark, who works as a Professional
Ethical Hacker for DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that some
irrelevant log files and signs of Trojans are present on the computers. He suspects that a malicious hacker has
accessed the network. Mark takes the help from Forensic Investigators and catches Jason.
Which of the following mistakes made by Jason helped the Forensic Investigators catch him?