A Review Of Actual GCIH Questions

It is more faster and easier to pass the GIAC GCIH exam by using Printable GIAC GIAC Certified Incident Handler questuins and answers. Immediate access to the Renewal GCIH Exam and find the same core area GCIH questions with professionally verified answers, then PASS your exam with a high score now.

Online GIAC GCIH free dumps demo Below:

NEW QUESTION 1
Which of the following tasks can be performed by using netcat utility?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Checking file integrity
  • B. Creating a Backdoor
  • C. Firewall testing
  • D. Port scanning and service identification

Answer: BCD

NEW QUESTION 2
You work as a Network Administrator in the SecureTech Inc. The SecureTech Inc. is using Linux- based server. Recently, you have updated the password policy of the company in which the server will disable passwords after four trials. What type of attack do you want to stop by enabling this policy?

  • A. Brute force
  • B. Replay
  • C. XSS
  • D. Cookie poisoning

Answer: A

NEW QUESTION 3
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He installs a rootkit on the Linux server of the We-are-secure network. Which of the following statements are true about rootkits?
Each correct answer represents a complete solution. Choose all that apply.

  • A. They allow an attacker to conduct a buffer overflow.
  • B. They allow an attacker to set a Trojan in the operating system and thus open a backdoor for anytime access.
  • C. They allow an attacker to replace utility programs that can be used to detect the attacker's activity.
  • D. They allow an attacker to run packet sniffers secretly to capture passwords.

Answer: BCD

NEW QUESTION 4
You enter the following URL on your Web browser:
http://www.we-are-secure.com/scripts/..%co%af../..%co%
af../windows/system32/cmd.exe?/c+dir+c:\
What kind of attack are you performing?

  • A. Directory traversal
  • B. Replay
  • C. Session hijacking
  • D. URL obfuscating

Answer: A

NEW QUESTION 5
Which of the following is used to gather information about a remote network protected by a firewall?

  • A. Warchalking
  • B. Wardialing
  • C. Firechalking
  • D. Firewalking

Answer: D

NEW QUESTION 6
You want to use PGP files for steganography. Which of the following tools will you use to accomplish the task?

  • A. Blindside
  • B. Snow
  • C. ImageHide
  • D. Stealth

Answer: D

NEW QUESTION 7
You send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024 using hping2 utility. This attack is known as __________.

  • A. Port scanning
  • B. Cloaking
  • C. Firewalking
  • D. Spoofing

Answer: C

NEW QUESTION 8
Adam, a malicious hacker is running a scan. Statistics of the scan is as follows:
Scan directed at open port: ClientServer


Solution:


Does this meet the goal?
  • A. Yes
  • B. Not Mastered

Answer: A

NEW QUESTION 9
Which of the following penetration testing phases involves gathering data from whois, DNS, and network scanning, which helps in mapping a target network and provides valuable information regarding the operating system and applications running on the systems?

  • A. Post-attack phase
  • B. On-attack phase
  • C. Attack phase
  • D. Pre-attack phase

Answer: D

NEW QUESTION 10
You work as a professional Ethical Hacker. You are assigned a project to test the security of www.weare-secure.com. You somehow enter in we-are-secure Inc. main server, which is Windows based.
While you are installing the NetCat tool as a backdoor in the we-are-secure server, you see the file credit.dat having the list of credit card numbers of the company's employees. You want to transfer the credit.dat file in your local computer so that you can sell that information on the internet in the good price. However, you do not want to send the contents of this file in the clear text format since you do not want that the Network Administrator of the we-are-secure Inc. can get any clue of the hacking attempt. Hence, you decide to send the content of the credit.dat file in the encrypted format.
What steps should you take to accomplish the task?

  • A. You will use the ftp service.
  • B. You will use Wireshark.
  • C. You will use CryptCat instead of NetCat.
  • D. You will use brutus.

Answer: C

NEW QUESTION 11
You work as a System Administrator for Happy World Inc. Your company has a server named uC1 that runs Windows Server 2008. The Windows Server virtualization role service is installed on the uC1 server which hosts one virtual machine that also runs Windows Server 2008. You are required to install a new application on the virtual machine. You need to ensure that in case of a failure of the application installation, you are able to quickly restore the virtual machine to its original state.
Which of the following actions will you perform to accomplish the task?

  • A. Use the Virtualization Management Console to save the state of the virtual machine.
  • B. Log on to the virtual host and create a new dynamically expanding virtual hard disk.
  • C. Use the Virtualization Management Console to create a snapshot of the virtual machine.
  • D. Use the Edit Virtual Hard Disk Wizard to copy the virtual hard disk of the virtual machine.

Answer: C

NEW QUESTION 12
Mark works as a Network Administrator for NetTech Inc. The network has 150 Windows 2000 Professional client computers and four Windows 2000 servers. All the client computers are able to connect to the Internet. Mark is concerned about malware infecting the client computers through the Internet. What will Mark do to protect the client computers from malware?
Each correct answer represents a complete solution. Choose two.

  • A. Educate users of the client computers to avoid malware.
  • B. Educate users of the client computers about the problems arising due to malware.
  • C. Prevent users of the client computers from executing any programs.
  • D. Assign Read-Only permission to the users for accessing the hard disk drives of the client computers.

Answer: AB

NEW QUESTION 13
Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration. The tool uses raw IP packets to determine the following:
What ports are open on our network systems.
What hosts are available on the network.
Identify unauthorized wireless access points.
What services (application name and version) those hosts are offering.
What operating systems (and OS versions) they are running.
What type of packet filters/firewalls are in use.
Which of the following tools is Victor using?

  • A. Nessus
  • B. Kismet
  • C. Nmap
  • D. Sniffer

Answer: C

NEW QUESTION 14
Which of the following statements are true about firewalking?
Each correct answer represents a complete solution. Choose all that apply.

  • A. To use firewalking, the attacker needs the IP address of the last known gateway before the firewall and the IP address of a host located behind the firewall.
  • B. In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall.
  • C. A malicious attacker can use firewalking to determine the types of ports/protocols that can bypass the firewall.
  • D. Firewalking works on the UDP packets.

Answer: ABC

NEW QUESTION 15
Maria works as the Chief Security Officer for Exambible Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'. What technique is Maria using?

  • A. Steganography
  • B. Public-key cryptography
  • C. RSA algorithm
  • D. Encryption

Answer: A

NEW QUESTION 16
Which of the following types of attacks slows down or stops a server by overloading it with requests?

  • A. DoS attack
  • B. Impersonation attack
  • C. Network attack
  • D. Vulnerability attack

Answer: A

NEW QUESTION 17
Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?

  • A. Fraggle
  • B. Ping flood
  • C. Bonk
  • D. Smurf

Answer: C

NEW QUESTION 18
......

Recommend!! Get the Full GCIH dumps in VCE and PDF From Certleader, Welcome to Download: https://www.certleader.com/GCIH-dumps.html (New 328 Q&As Version)