Free GCIH Exam Dumps

Question 56

Which of the following tools is an automated tool that is used to implement SQL injections and to retrieve data from Web server databases?

Correct Answer:B

Question 57

Which of the following is used to gather information about a remote network protected by a firewall?

Correct Answer:D

Question 58

Which of the following applications is NOT used for passive OS fingerprinting?

Correct Answer:D

Question 59

Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denialof-service, or unauthorized changes to system hardware, software, or data?

Correct Answer:B

Question 60

Which of the following types of attacks is targeting a Web server with multiple compromised computers that are simultaneously sending hundreds of FIN packets with spoofed IP source IP addresses?

Correct Answer:C