Free GCIH Exam Dumps

Question 36

Which of the following applications automatically calculates cryptographic hashes of all key system files that are to be monitored for modifications?

Correct Answer:A

Question 37

Which of the following statements about buffer overflow are true?
Each correct answer represents a complete solution. Choose two.

Correct Answer:BD

Question 38

In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entire zone file for a domain from a DNS server. The information provided by the DNS zone can help an attacker gather user names, passwords, and other valuable information. To attempt a zone transfer, an attacker must be connected to a DNS server that is the authoritative server for that zone. Besides this, an attacker can launch a Denial of Service attack against the zone's DNS servers by flooding them with a lot of requests. Which of the following tools can an attacker use to perform a DNS zone transfer?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ABD

Question 39

Which of the following tools can be used for steganography?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:AC

Question 40

John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

Correct Answer:B