Actual GIAC GCIH Exam Questions - Latest GCIH Dumps RealExamCollection.com


John25519

Uploaded on Jan 9, 2020

Category Education

The most important thing for good preparation is the appropriate and suitable choice of study material. Our experts have done an endeavor to help IT candidates providing a fully valid and authentic study guide. GIAC GCIH exam dumps has largely affected the students’ results and have paved their way towards a bright career. This valuable help is available at RealExamCollection. It can be downloaded in PDF by paying a cheap price.

Category Education

Comments

                     

Actual GIAC GCIH Exam Questions - Latest GCIH Dumps RealExamCollection.com

GIA C Exam GCIH GIAC Certified Incident Handler Verson: Demo [ Total Questions: 10 ] https://www.realexamcollection.com/giac/gcih-dumps.html GIAC GCIH : Practice Test Topic 1, Volume A Question No : 1 - (Topic 1) Which of the following are the primary goals of the incident handling team? Each correct answer represents a complete solution. Choose all that apply. A. Freeze the scene. B. Repair any damage caused by an incident. C. Prevent any further damage. D. Inform higher authorities. Answer: A,B,C Question No : 2 - (Topic 1) Which of the following attacks is specially used for cracking a password? A. PING attack B. Dictionary attack C. Vulnerability attack D. DoS attack Answer: B Question No : 3 - (Topic 1) John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He performs Web vulnerability scanning on the We- are-secure server. The output of the scanning test is as follows: C:\whisker.pl -h target_IP_address -- whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - = = Host: target_IP_address 3 GIAC GCIH : Practice Test = Server: Apache/1.3.12 (Win32) ApacheJServ/1.1 mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22 + 200 OK: HEAD /cgi-bin/printenv John recognizes /cgi-bin/printenv vulnerability ('Printenv' vulnerability) in the We_are_secure server. Which of the following statements about 'Printenv' vulnerability are true? Each correct answer represents a complete solution. Choose all that apply. A. This vulnerability helps in a cross site scripting attack. B. 'Printenv' vulnerability maintains a log file of user activities on the Website, which may be useful for the attacker. C. The countermeasure to 'printenv' vulnerability is to remove the CGI script. D. With the help of 'printenv' vulnerability, an attacker can input specially crafted links and/or other malicious scripts. Answer: A,C,D Question No : 4 - (Topic 1) Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system? A. Piggybacking B. Hacking C. Session hijacking D. Keystroke logging Answer: C Topic 2, Volume B Question No : 5 - (Topic 2) Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes. On the basis of above information, which of the following types of attack is Adam attempting to perform? 4 GIAC GCIH : Practice Test A. Fraggle attack B. Ping of death attack C. SYN Flood attack D. Land attack Answer: B Question No : 6 - (Topic 2) Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer? A. Buffer-overflow attack B. Shoulder surfing attack C. Man-in-the-middle attack D. Denial-of-Service (DoS) attack Answer: B Question No : 7 - (Topic 2) James works as a Database Administrator for Techsoft Inc. The company has a SQL Server 2005 computer. The computer has a database named Sales. Users complain that the performance of the database has deteriorated. James opens the System Monitor tool and finds that there is an increase in network traffic. What kind of attack might be the cause of the performance deterioration? A. Denial-of-Service B. Injection C. Internal attack D. Virus Answer: A Question No : 8 - (Topic 2) Which of the following tools will you use to prevent from session hijacking? 5 GIAC GCIH : Practice Test Each correct answer represents a complete solution. Choose all that apply. A. OpenSSH B. Rlogin C. Telnet D. SSL Answer: A,D Topic 3, Volume C Question No : 9 - (Topic 3) Which of the following types of channels is used by Trojans for communication? A. Loop channel B. Open channel C. Covert channel D. Overt channel Answer: C Question No : 10 - (Topic 3) Which of the following statements is true about a Trojan engine? A. It limits the system resource usage. B. It specifies the signatures that keep a watch for a host or a network sending multiple packets to a single host or a single network. C. It specifies events that occur in a related manner within a sliding time interval. D. It analyzes the nonstandard protocols, such as TFN2K and BO2K. Answer: D https://www.realexamcollection.com/giac/gcih-dumps.html 6