Question 7

Which of the following malicious programs changes its signature continuously to be invisible to IDS?

Correct Answer:D

Question 8

Which of the following OSI layers is responsible for protocol conversion, data encryption/decryption, and data compression?

Correct Answer:C

Question 9

Which of the following monitors program activities and modifies malicious activities on a system?

Correct Answer:C

Question 10

Which of the following statements is NOT true about the file slack spaces in Windows operating system?

Correct Answer:B

Question 11

Which of the following is a checksum algorithm?

Correct Answer:B

Question 12

In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entire zone file for a domain from a DNS server. The information provided by the DNS zone can help an attacker gather user names, passwords, and other valuable information. To attempt a zone transfer, an attacker must be connected to a DNS server that is the authoritative server for that zone. Besides this, an attacker can launch a Denial of Service attack against the zone's DNS servers by flooding them with a lot of requests. Which of the following tools can an attacker use to perform a DNS zone transfer?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ABC

START GCIA EXAM