Question 61

You are the Administrator for a corporate network. You are concerned about denial of service attacks.
Which of the following measures would be most helpful in defending against a Denial-of-Service (DoS) attack?

Correct Answer:C

Question 62

CORRECT TEXT
Fill in the blank with the appropriate name of the attack.
______ takes best advantage of an existing authenticated connection

Correct Answer:sessionhijacking

Question 63

Which of the following tools is used to attack the Digital Watermarking?

Correct Answer:B

Question 64

Which of the following is used by attackers to obtain an authenticated connection on a network?

Correct Answer:B

Question 65

CORRECT TEXT
Fill in the blank with the appropriate option to complete the statement below.
You want to block all UDP packets coming to the Linux server using the portsentry utility. For this, you have to enable the ______ option in the portsentry configuration file.

Correct Answer:BLOCK_UDP

Question 66

Which of the following Linux rootkits allows an attacker to hide files, processes, and network connections?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:CD

START GCIH EXAM