Free GCIH Exam Dumps

Question 76

John works as a C programmer. He develops the following C program:
#include
#include
#include
int buffer(char *str) {
char buffer1[10];
strcpy(buffer1, str);
return 1;
}
int main(int argc, char *argv[]) {
buffer (argv[1]);
printf("Executedn");
return 1;
}
His program is vulnerable to a __________ attack.

Correct Answer:C

Question 77

CORRECT TEXT
Fill in the blank with the appropriate name of the attack.
______ takes best advantage of an existing authenticated connection

Correct Answer:sessionhijacking

Question 78

Which of the following statements about buffer overflow is true?

Correct Answer:C

Question 79

Which of the following rootkits is able to load the original operating system as a virtual machine, thereby enabling it to intercept all hardware calls made by the original operating system?

Correct Answer:C

Question 80

In which of the following attacks does an attacker create the IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system?

Correct Answer:B