GCIH Exam Question 36

Which of the following scanning tools is also a network analysis tool that sends packets with
nontraditional IP stack parameters and allows the scanner to gather information from the response packets
generated?
  • GCIH Exam Question 37

    Which of the following strategies allows a user to limit access according to unique hardware information supplied by a
    potential client?
  • GCIH Exam Question 38

    Which of the following attacks allows an attacker to retrieve crucial information from a Web server's database?
  • GCIH Exam Question 39

    You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?
  • GCIH Exam Question 40

    Which of the following virus is a script that attaches itself to a file or template?