Free GCIH Exam Dumps

Question 71

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. An attacker uses software that keeps trying password combinations until the correct password is found. Which type of attack is this?

Correct Answer:C

Question 72

Which of the following tools can be used to detect the steganography?

Correct Answer:A

Question 73

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:BCD

Question 74

Which of the following types of attacks come under the category of hacker attacks?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:BD

Question 75

Which of the following malicious software travels across computer networks without the assistance of a user?

Correct Answer:A