Free GCIH Exam Dumps

Question 41

You discover that your network routers are being flooded with broadcast packets that have the return address of one of the servers on your network. This is resulting in an overwhelming amount of traffic going back to that server and flooding it. What is this called?

Correct Answer:C

Question 42

Which of the following is a technique of using a modem to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for computers, Bulletin board systems, and fax machines?

Correct Answer:D

Question 43

Choose the items from the given list that are required to be in the response kit of an Incident Handler.
GCIH dumps exhibit
Solution:
GCIH dumps exhibit

Does this meet the goal?

Correct Answer:A

Question 44

Adam, a malicious hacker, wants to perform a reliable scan against a remote target. He is not concerned about being stealth at this point.
Which of the following type of scans would be most accurate and reliable?

Correct Answer:B

Question 45

Which of the following takes control of a session between a server and a client using TELNET, FTP, or any other non-encrypted TCP/IP utility?

Correct Answer:B