Question 55

You discover that all available network bandwidth is being used by some unknown service. You discover that UDP packets are being used to connect the echo service on one machine to the chargen service on another machine. What kind of attack is this?

Correct Answer:B

Question 56

Which of the following statements is true about the difference between worms and Trojan horses?

Correct Answer:D

Question 57

Which of the following statements are true about tcp wrappers?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ABC

Question 58

Which of the following attacks allows an attacker to retrieve crucial information from a Web server's database?

Correct Answer:C

Question 59

Which of the following are open-source vulnerability scanners?

Correct Answer:ABD

Question 60

Which of the following statements about Ping of Death attack is true?

Correct Answer:D

START GCIH EXAM