Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Exam GCIH All Questions
Exam GCIH All Questions

View all questions & answers for the GCIH exam

GIAC Security Administration GCIH Question # 64 Topic 7 Discussion

GCIH Exam Topic 7 Question 64 Discussion:
Question #: 64
Topic #: 7

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following steps of the pre-attack phase:

l Information gathering

l Determining network range

l Identifying active machines

l Finding open ports and applications

l OS fingerprinting

l Fingerprinting services

Now John wants to perform network mapping of the We-are-secure network. Which of the following tools can he use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.


A.

Ettercap


B.

Traceroute


C.

Cheops


D.

NeoTrace


Get Premium GCIH Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.