Free GCIH Exam Dumps

Question 11

Which of the following statements about threats are true?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:BCD

Question 12

Which of the following is an Internet mapping technique that relies on various BGP collectors that collect information such as routing updates and tables and provide this information publicly?

Correct Answer:C

Question 13

Which of the following types of malware does not replicate itself but can spread only when the circumstances are beneficial?

Correct Answer:D

Question 14

Adam works as a Security Analyst for Umbrella Inc. Company has a Windows-based network. All computers run on Windows XP. Manager of the Sales department complains Adam about the unusual behavior of his computer. He told Adam that some pornographic contents are suddenly appeared on his computer overnight. Adam suspects that some malicious software or Trojans have been installed on the computer. He runs some diagnostics programs and Port scanners and found that the Port 12345, 12346, and 20034 are open. Adam also noticed some tampering with the Windows registry, which causes one application to run every time when Windows start.
Which of the following is the most likely reason behind this issue?

Correct Answer:C

Question 15

You have inserted a Trojan on your friend's computer and you want to put it in the startup so that whenever the computer reboots the Trojan will start to run on the startup. Which of the following registry entries will you edit to accomplish the task?

Correct Answer:C