Free GCIH Exam Dumps

Question 31

You want to scan your network quickly to detect live hosts by using ICMP ECHO Requests. What type of scanning will you perform to accomplish the task?

Correct Answer:D

Question 32

Which of the following refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open?

Correct Answer:C

Question 33

You want to use PGP files for steganography. Which of the following tools will you use to accomplish the task?

Correct Answer:D

Question 34

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple small- sized packets to the target computer. Hence, it becomes very difficult for an IDS to detect the attack signatures of such attacks. Which of the following tools can be used to perform session splicing attacks?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:AC

Question 35

Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to test the network security of the company. He created a webpage to discuss the progress of the tests with employees who were interested in following the test. Visitors were allowed to click on a company's icon to mark the progress of the test. Adam successfully embeds a keylogger. He also added some statistics on the webpage. The firewall protects the network well and allows strict Internet access.
How was security compromised and how did the firewall respond?

Correct Answer:A