Question 73

You enter the following URL on your Web browser:
http://www.we-are-secure.com/scripts/..%co

Correct Answer:A

Question 74

Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?

Correct Answer:A

Question 75

A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as network saturation attack or bandwidth consumption attack. Attackers perform DoS attacks by sending a large number of protocol packets to a network. The problems caused by a DoS attack are as follows:
l Saturation of network resources
l Disruption of connections between two computers, thereby preventing communications between services
l Disruption of services to a specific computer
l Failure to access a Web site
l Increase in the amount of spam
Which of the following can be used as countermeasures against DoS attacks?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ABCD

Question 76

Who are the primary victims of smurf attacks on the contemporary Internet system?

Correct Answer:A

Question 77

Mark works as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company uses Check Point SmartDefense to provide security to the network. Mark uses SmartDefense on the HTTP servers of the company to fix the limitation for the maximum response header length. Which of the following attacks can be blocked by defining this limitation?

Correct Answer:A

Question 78

You want to connect to your friend's computer and run a Trojan on it. Which of the following tools will you use to accomplish the task?

Correct Answer:A

START GCIH EXAM