Free GCIH Exam Dumps

Question 51

Which of the following types of channels is used by Trojans for communication?

Correct Answer:C

Question 52

Which of the following scanning tools is also a network analysis tool that sends packets with nontraditional IP stack parameters and allows the scanner to gather information from the response packets generated?

Correct Answer:D

Question 53

108 ms 14 0.so-4-1-0.TL1.ATL5.ALTER.NET (152.63.10.129) 37.894 ms 33.244 ms
Solution:


Does this meet the goal?

Correct Answer:A

Question 54

Which of the following can be used as a countermeasure against the SQL injection attack?
Each correct answer represents a complete solution. Choose two.

Correct Answer:AD

Question 55

John is a malicious attacker. He illegally accesses the server of We-are-secure Inc. He then places a backdoor in the We-are-secure server and alters its log files. Which of the following steps of malicious hacking includes altering the server log files?

Correct Answer:B