Improve GCIH Training Tools For GIAC Certified Incident Handler Certification

we provide Tested GIAC GCIH exam answers which are the best for clearing GCIH test, and to get certified by GIAC GIAC Certified Incident Handler. The GCIH Questions & Answers covers all the knowledge points of the real GCIH exam. Crack your GIAC GCIH Exam with latest dumps, guaranteed!

Check GCIH free dumps before getting the full version:

NEW QUESTION 1
Which of the following tools is used to download the Web pages of a Website on the local system?

  • A. wget
  • B. jplag
  • C. Nessus
  • D. Ettercap

Answer: A

NEW QUESTION 2
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. An attacker uses software that keeps trying password combinations until the correct password is found. Which type of attack is this?

  • A. Denial-of-Service
  • B. Man-in-the-middle
  • C. Brute Force
  • D. Vulnerability

Answer: C

NEW QUESTION 3
Which of the following tools combines two programs, and also encrypts the resulting package in an attempt to foil antivirus programs?

  • A. Trojan Man
  • B. EliteWrap
  • C. Tiny
  • D. NetBus

Answer: A

NEW QUESTION 4
Which of the following programming languages are NOT vulnerable to buffer overflow attacks?
Each correct answer represents a complete solution. Choose two.

  • A. C
  • B. Java
  • C. C++
  • D. Perl

Answer: BD

NEW QUESTION 5
Which of the following applications automatically calculates cryptographic hashes of all key system files that are to be monitored for modifications?

  • A. Tripwire
  • B. TCPView
  • C. PrcView
  • D. Inzider

Answer: A

NEW QUESTION 6
You have forgotten your password of an online shop. The web application of that online shop asks you to enter your email so that they can send you a new password. You enter your email
you@gmail.com
And press the submit button.
The Web application displays the server error. What can be the reason of the error?

  • A. You have entered any special character in email.
  • B. Email entered is not valid.
  • C. The remote server is down.
  • D. Your internet connection is slow.

Answer: A

NEW QUESTION 7
Which of the following is the most common vulnerability that can affect desktop applications written in native code?

  • A. SpyWare
  • B. DDoS attack
  • C. Malware
  • D. Buffer overflow

Answer: D

NEW QUESTION 8
In which of the following attacks does the attacker gather information to perform an access attack?

  • A. Land attack
  • B. Reconnaissance attack
  • C. Vulnerability attack
  • D. DoS attack

Answer: B

NEW QUESTION 9
John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.
Original cookie values:
ItemID1=2
ItemPrice1=900
ItemID2=1
ItemPrice2=200
Modified cookie values:
ItemID1=2
ItemPrice1=1
ItemID2=1
ItemPrice2=1
Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.
Which of the following hacking techniques is John performing?

  • A. Computer-based social engineering
  • B. Man-in-the-middle attack
  • C. Cross site scripting
  • D. Cookie poisoning

Answer: D

NEW QUESTION 10
910 ms 15 0.so-7-0-0.XL1.MIA4.ALTER.NET (152.63.86.189) 51.165 ms 49.935 ms


Solution:


Does this meet the goal?
  • A. Yes
  • B. Not Mastered

Answer: A

NEW QUESTION 11
You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

  • A. Nmap
  • B. Ethereal
  • C. Ettercap
  • D. Netcraft

Answer: D

NEW QUESTION 12
Which of the following services CANNOT be performed by the nmap utility?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Passive OS fingerprinting
  • B. Sniffing
  • C. Active OS fingerprinting
  • D. Port scanning

Answer: AB

NEW QUESTION 13
Which of the following are the automated tools that are used to perform penetration testing?
Each correct answer represents a complete solution. Choose two.

  • A. Pwdump
  • B. Nessus
  • C. EtherApe
  • D. GFI LANguard

Answer: BD

NEW QUESTION 14
Which of the following is the best method of accurately identifying the services running on a victim host?

  • A. Use of the manual method of telnet to each of the open ports.
  • B. Use of a port scanner to scan each port to confirm the services running.
  • C. Use of hit and trial method to guess the services and ports of the victim host.
  • D. Use of a vulnerability scanner to try to probe each port to verify which service is running.

Answer: A

NEW QUESTION 15
Which of the following statements are true about netcat?
Each correct answer represents a complete solution. Choose all that apply.

  • A. It provides special tunneling, such as UDP to TCP, with the possibility of specifying all network parameters.
  • B. It can be used as a file transfer solution.
  • C. It provides outbound and inbound connections for TCP and UDP ports.
  • D. The nc -z command can be used to redirect stdin/stdout from a program.

Answer: ABC

NEW QUESTION 16
Choose the correct six -step process of threat modeling from the list of different steps.
GCIH dumps exhibit


Solution:
GCIH dumps exhibit

Does this meet the goal?
  • A. Yes
  • B. Not Mastered

Answer: A

NEW QUESTION 17
Which of the following tools is described in the statement given below?
"It has a database containing signatures to be able to detect hundreds of vulnerabilities in UNIX, Windows, and commonly used web CGI scripts. Moreover, the database detects DdoS zombies and Trojans as well."

  • A. SARA
  • B. Nessus
  • C. Anti-x
  • D. Nmap

Answer: B

NEW QUESTION 18
......

P.S. Surepassexam now are offering 100% pass ensure GCIH dumps! All GCIH exam questions have been updated with correct answers: https://www.surepassexam.com/GCIH-exam-dumps.html (328 New Questions)