GIAC Related Exams
GCIA Exam

Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?
Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords?
You are concerned about outside attackers penetrating your network via your company Web server. You wish to place your Web server between two firewalls. One firewall between the Web server and the outside world. The other between the Web server and your network. What is this called?