Question 79

Which of the following ensures that a party to a dispute cannot deny the authenticity of their signature on a document or the sending of a message that they originated?

Correct Answer:C

Question 80

Which of the following are countermeasures to prevent unauthorized database access attacks?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:ABCD

Question 81

Which of the following types of attacks is targeting a Web server with multiple compromised computers that are simultaneously sending hundreds of FIN packets with spoofed IP source IP addresses?

Correct Answer:C

Question 82

Which of the following US Acts emphasized a "risk-based policy for cost-effective security" and makes mandatory for agency program officials, chief information officers, and inspectors general (IGs) to conduct annual reviews of the agency's information security program and report the results to Office of Management and Budget?

Correct Answer:D

Question 83

Sharpening, Rotating, Resampling, and Softening the image.
Which of the following Steganography attacks is Victor using?

Correct Answer:D

Question 84

Which of the following tasks can be performed by using netcat utility?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:BCD

START GCIH EXAM