Free GCIH Exam Dumps

Question 6

Which of the following tools uses common UNIX/Linux tools like the strings and grep commands to search core system programs for signatures of the rootkits?

Correct Answer:C

Question 7

Firewalking is a technique that can be used to gather information about a remote network protected by a firewall. This technique can be used effectively to perform information gathering attacks. In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall. Which of the following are pre-requisites for an attacker to conduct firewalking?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ABD

Question 8

Which of the following ensures that the investigation process of incident response team does not break any laws during the response to an incident?

Correct Answer:C

Question 9

Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

Correct Answer:B

Question 10

Which of the following is executed when a predetermined event occurs?

Correct Answer:B