GCIH Exam Question 31
Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.
What is the name of this library?
What is the name of this library?
GCIH Exam Question 32
Which of the following are countermeasures to prevent unauthorized database access attacks?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
GCIH Exam Question 33
Which of the following Trojans is used by attackers to modify the Web browser settings?
GCIH Exam Question 34
Which of the following can be used as a countermeasure against the SQL injection attack?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
GCIH Exam Question 35
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare- secure.com. He installs a rootkit on the Linux server of the We-are-secure network. Which of the following statements are true about rootkits?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.