GCIH Exam - GIAC Certified Incident Handler

certleader.com

It is more faster and easier to pass the GIAC GCIH exam by using Tested GIAC GIAC Certified Incident Handler questuins and answers. Immediate access to the Far out GCIH Exam and find the same core area GCIH questions with professionally verified answers, then PASS your exam with a high score now.

Check GCIH free dumps before getting the full version:

NEW QUESTION 1
Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

  • A. Buffer-overflow attack
  • B. Shoulder surfing attack
  • C. Man-in-the-middle attack
  • D. Denial-of-Service (DoS) attack

Answer: B

NEW QUESTION 2
Which of the following is executed when a predetermined event occurs?

  • A. Trojan horse
  • B. Logic bomb
  • C. MAC
  • D. Worm

Answer: B

NEW QUESTION 3
Which of the following protocol loggers is used to detect ping sweep?

  • A. lppi
  • B. pitl
  • C. dpsl
  • D. ippl

Answer: D

NEW QUESTION 4
US Garments wants all encrypted data communication between corporate office and remote location.
They want to achieve following results:
l Authentication of users
l Anti-replay
l Anti-spoofing
l IP packet encryption
They implemented IPSec using Authentication Headers (AHs). Which results does this solution provide? (Click the Exhibit button on the toolbar to see the case study.)
Each correct answer represents a complete solution. Choose all that apply.

  • A. Anti-replay
  • B. IP packet encryption
  • C. Authentication of users
  • D. Anti-spoofing

Answer: AD

NEW QUESTION 5
You work as a Network Administrator in the SecureTech Inc. The SecureTech Inc. is using Linux- based server. Recently, you have updated the password policy of the company in which the server will disable passwords after four trials. What type of attack do you want to stop by enabling this policy?

  • A. Brute force
  • B. Replay
  • C. XSS
  • D. Cookie poisoning

Answer: A

NEW QUESTION 6
Which of the following types of attacks is the result of vulnerabilities in a program due to poor programming techniques?

  • A. Evasion attack
  • B. Denial-of-Service (DoS) attack
  • C. Ping of death attack
  • D. Buffer overflow attack

Answer: D

NEW QUESTION 7
Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?
Each correct answer represents a complete solution. Choose all that apply.

  • A. nmap
  • B. scanlogd
  • C. libnids
  • D. portsentry

Answer: BCD

NEW QUESTION 8
Adam, a malicious hacker is running a scan. Statistics of the scan is as follows:
Scan directed at open port: ClientServer


Solution:


Does this meet the goal?
  • A. Yes
  • B. Not Mastered

Answer: A

NEW QUESTION 9
Which of the following takes control of a session between a server and a client using TELNET, FTP, or any other non-encrypted TCP/IP utility?

  • A. Dictionary attack
  • B. Session Hijacking
  • C. Trojan horse
  • D. Social Engineering

Answer: B

NEW QUESTION 10
Which of the following penetration testing phases involves reconnaissance or data gathering?

  • A. Attack phase
  • B. Pre-attack phase
  • C. Post-attack phase
  • D. Out-attack phase

Answer: B

NEW QUESTION 11
Which of the following is used to gather information about a remote network protected by a firewall?

  • A. Warchalking
  • B. Wardialing
  • C. Firechalking
  • D. Firewalking

Answer: D

NEW QUESTION 12
Firekiller 2000 is an example of a __________.

  • A. Security software disabler Trojan
  • B. DoS attack Trojan
  • C. Data sending Trojan
  • D. Remote access Trojan

Answer: A

NEW QUESTION 13
Which of the following tools is described in the statement given below?
"It has a database containing signatures to be able to detect hundreds of vulnerabilities in UNIX, Windows, and commonly used web CGI scripts. Moreover, the database detects DdoS zombies and Trojans as well."

  • A. SARA
  • B. Nessus
  • C. Anti-x
  • D. Nmap

Answer: B

NEW QUESTION 14
Which of the following terms describes an attempt to transfer DNS zone data?

  • A. Reconnaissance
  • B. Encapsulation
  • C. Dumpster diving
  • D. Spam

Answer: A

NEW QUESTION 15
In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?

  • A. Ping of death
  • B. Jolt
  • C. Fraggle
  • D. Teardrop

Answer: A

NEW QUESTION 16
An Active Attack is a type of steganography attack in which the attacker changes the carrier during the communication process. Which of the following techniques is used for smoothing the transition and controlling contrast on the hard edges, where there is significant color transition?

  • A. Soften
  • B. Rotate
  • C. Sharpen
  • D. Blur

Answer: D

NEW QUESTION 17
Which of the following is a technique for creating Internet maps?
Each correct answer represents a complete solution. Choose two.

  • A. Active Probing
  • B. AS PATH Inference
  • C. Object Relational Mapping
  • D. Network Quota

Answer: AB

NEW QUESTION 18
......

Thanks for reading the newest GCIH exam dumps! We recommend you to try the PREMIUM Allfreedumps.com GCIH dumps in VCE and PDF here: https://www.allfreedumps.com/GCIH-dumps.html (328 Q&As Dumps)