Free GCIH Exam Dumps

Question 66

Which of the following threats is a combination of worm, virus, and Trojan horse characteristics?

Correct Answer:C

Question 67

Which of the following types of scan does not open a full TCP connection?

Correct Answer:C

Question 68

John, a part-time hacker, has accessed in unauthorized way to the www.yourbank.com banking Website and stolen the bank account information of its users and their credit card numbers by using the SQL injection attack. Now, John wants to sell this information to malicious person Mark and make a deal to get a good amount of money. Since, he does not want to send the hacked information in the clear text format to Mark; he decides to send information in hidden text. For this, he takes a steganography tool and hides the information in ASCII text by appending whitespace to the end of lines and encrypts the hidden information by using the IDEA encryption algorithm. Which of the following tools is John using for steganography?

Correct Answer:C

Question 69

In which of the following scanning methods do Windows operating systems send only RST packets irrespective of whether the port is open or closed?

Correct Answer:A

Question 70

You work as a System Engineer for Cyber World Inc. Your company has a single Active Directory domain. All servers in the domain run Windows Server 2008. The Microsoft Hyper-V server role has been installed on one of the servers, namely uC1. uC1 hosts twelve virtual machines. You have been given the task to configure the Shutdown option for uC1, so that each virtual machine shuts down before the main Hyper-V server shuts down. Which of the following actions will you perform to accomplish the task?

Correct Answer:A