Question 43

You have forgotten your password of an online shop. The web application of that online shop asks you to enter your email so that they can send you a new password. You enter your email
you@gmail.com
And press the submit button.
The Web application displays the server error. What can be the reason of the error?

Correct Answer:A

Question 44

Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?

Correct Answer:C

Question 45

Which of the following tools are used as a network traffic monitoring tool in the Linux operating system?
Each correct answer represents a complete solution. Choose all that apply.

Correct Answer:BCD

Question 46

Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?
Each correct answer represents a complete solution. Choose two.

Correct Answer:CD

Question 47

CORRECT TEXT
Fill in the blank with the appropriate term.
______ is a technique used to make sure that incoming packets are actually from the networks that they claim to be from.

Correct Answer:Ingressfiltering

Question 48

Which of the following protocol loggers is used to detect ping sweep?

Correct Answer:D

START GCIH EXAM