New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

GCIH GIAC Certified Incident Handler Questions and Answers

Questions 4

Which of the following practices come in the category of denial of service attack?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Performing Back door attack on a system

B.

Disrupting services to a specific computer

C.

Sending thousands of malformed packets to a network for bandwidth consumption

D.

Sending lots of ICMP packets to an IP address

Buy Now
Questions 5

John is a malicious attacker. He illegally accesses the server of We-are-secure Inc. He then places a backdoor in the We-are-secure server and alters its log files. Which of the following steps of malicious hacking includes altering the server log files?

Options:

A.

Maintaining access

B.

Covering tracks

C.

Gaining access

D.

Reconnaissance

Buy Now
Questions 6

Which of the following are used to identify who is responsible for responding to an incident?

Options:

A.

Disaster management policies

B.

Incident response manuals

C.

Disaster management manuals

D.

Incident response policies

Buy Now
Questions 7

John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He is working on the Linux operating system. He wants to sniff the we-are-secure network and intercept a conversation between two employees of the company through session hijacking. Which of the following tools will John use to accomplish the task?

Options:

A.

Hunt

B.

IPChains

C.

Ethercap

D.

Tripwire

Buy Now
Questions 8

Which of the following is a network worm that exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system?

Options:

A.

Win32/Agent

B.

WMA/TrojanDownloader.GetCodec

C.

Win32/Conflicker

D.

Win32/PSW.OnLineGames

Buy Now
Questions 9

Adam, a novice computer user, works primarily from home as a medical professional. He just bought a brand new Dual Core Pentium computer with over 3 GB of RAM. After about two months of working on his new computer, he notices that it is not running nearly as fast as it used to. Adam uses antivirus software, anti-spyware software, and keeps the computer up-to-date with Microsoft patches. After another month of working on the computer, Adam finds that his computer is even more noticeably slow. He also notices a window or two pop-up on his screen, but they quickly disappear. He has seen these windows show up, even when he has not been on the Internet. Adam notices that his computer only has about 10 GB of free space available. Since his hard drive is a 200 GB hard drive, Adam thinks this is very odd.

Which of the following is the mostly likely the cause of the problem?

Options:

A.

Computer is infected with the stealth kernel level rootkit.

B.

Computer is infected with stealth virus.

C.

Computer is infected with the Stealth Trojan Virus.

D.

Computer is infected with the Self-Replication Worm.

Buy Now
Questions 10

Which of the following is designed to protect the Internet resolvers (clients) from forged DNS data created by DNS cache poisoning?

Options:

A.

Stub resolver

B.

BINDER

C.

Split-horizon DNS

D.

Domain Name System Extension (DNSSEC)

Buy Now
Questions 11

You see the career section of a company's Web site and analyze the job profile requirements. You conclude that the company wants professionals who have a sharp knowledge of Windows server 2003 and Windows active directory installation and placement. Which of the following steps are you using to perform hacking?

Options:

A.

Scanning

B.

Covering tracks

C.

Reconnaissance

D.

Gaining access

Buy Now
Questions 12

Which of the following statements are true about netcat?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It provides special tunneling, such as UDP to TCP, with the possibility of specifying all network parameters.

B.

It can be used as a file transfer solution.

C.

It provides outbound and inbound connections for TCP and UDP ports.

D.

The nc -z command can be used to redirect stdin/stdout from a program.

Buy Now
Questions 13

You want to scan your network quickly to detect live hosts by using ICMP ECHO Requests. What type of scanning will you perform to accomplish the task?

Options:

A.

Idle scan

B.

TCP SYN scan

C.

XMAS scan

D.

Ping sweep scan

Buy Now
Questions 14

You run the following bash script in Linux:

for i in 'cat hostlist.txt' ;do

nc -q 2 -v $i 80 < request.txt done

Where, hostlist.txt file contains the list of IP addresses and request.txt is the output file. Which of the following tasks do you want to perform by running this script?

Options:

A.

You want to put nmap in the listen mode to the hosts given in the IP address list.

B.

You want to perform banner grabbing to the hosts given in the IP address list.

C.

You want to perform port scanning to the hosts given in the IP address list.

D.

You want to transfer file hostlist.txt to the hosts given in the IP address list.

Buy Now
Questions 15

Which of the following commands can be used for port scanning?

Options:

A.

nc -t

B.

nc -z

C.

nc -w

D.

nc -g

Buy Now
Questions 16

Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to test the network security of the company. He created a webpage to discuss the progress of the tests with employees who were interested in following the test. Visitors were allowed to click on a company's icon to mark the progress of the test. Adam successfully embeds a keylogger. He also added some statistics on the webpage. The firewall protects the network well and allows strict Internet access.

How was security compromised and how did the firewall respond?

Options:

A.

The attack was social engineering and the firewall did not detect it.

B.

Security was not compromised as the webpage was hosted internally.

C.

The attack was Cross Site Scripting and the firewall blocked it.

D.

Security was compromised as keylogger is invisible for firewall.

Buy Now
Questions 17

Which of the following types of attacks is mounted with the objective of causing a negative impact on the performance of a computer or network?

Options:

A.

Vulnerability attack

B.

Man-in-the-middle attack

C.

Denial-of-Service (DoS) attack

D.

Impersonation attack

Buy Now
Questions 18

Which of the following attacks come under the category of layer 2 Denial-of-Service attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Spoofing attack

B.

SYN flood attack

C.

Password cracking

D.

RF jamming attack

Buy Now
Questions 19

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The company has three Windows 2008 file servers, 150 Windows XP Professional, thirty UNIX-based client computers. The network users have identical user accounts for both Active Directory and the UNIX realm. You want to ensure that the UNIX clients on the network can access the file servers. You also want to ensure that the users are able to access all resources by logging on only once, and that no additional software is installed on the UNIX clients. What will you do to accomplish this task?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Configure a distributed file system (Dfs) on the file server in the network.

B.

Enable the Network File System (NFS) component on the file servers in the network.

C.

Configure ADRMS on the file servers in the network.

D.

Enable User Name Mapping on the file servers in the network.

Buy Now
Questions 20

Which of the following characters will you use to check whether an application is vulnerable to an SQL injection attack?

Options:

A.

Dash (-)

B.

Double quote (")

C.

Single quote (')

D.

Semi colon (;)

Buy Now
Questions 21

What is the major difference between a worm and a Trojan horse?

Options:

A.

A worm spreads via e-mail, while a Trojan horse does not.

B.

A worm is a form of malicious program, while a Trojan horse is a utility.

C.

A worm is self replicating, while a Trojan horse is not.

D.

A Trojan horse is a malicious program, while a worm is an anti-virus software.

Buy Now
Questions 22

Which of the following types of attacks is the result of vulnerabilities in a program due to poor programming techniques?

Options:

A.

Evasion attack

B.

Denial-of-Service (DoS) attack

C.

Ping of death attack

D.

Buffer overflow attack

Buy Now
Questions 23

Which of the following statements about buffer overflow is true?

Options:

A.

It manages security credentials and public keys for message encryption.

B.

It is a collection of files used by Microsoft for software updates released between major service pack releases.

C.

It is a condition in which an application receives more data than it is configured to accept.

D.

It is a false warning about a virus.

Buy Now
Questions 24

Which of the following tools is used for vulnerability scanning and calls Hydra to launch a dictionary attack?

Options:

A.

Whishker

B.

Nessus

C.

SARA

D.

Nmap

Buy Now
Questions 25

In which of the following attacks does the attacker gather information to perform an access attack?

Options:

A.

Land attack

B.

Reconnaissance attack

C.

Vulnerability attack

D.

DoS attack

Buy Now
Questions 26

Fill in the blank with the appropriate name of the attack.

______ takes best advantage of an existing authenticated connection

Options:

Buy Now
Questions 27

Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover.

Which of the following Steganography methods is Victor using to accomplish the task?

Options:

A.

The distortion technique

B.

The spread spectrum technique

C.

The substitution technique

D.

The cover generation technique

Buy Now
Questions 28

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following measures would be most helpful in defending against a Denial-of-Service (DoS) attack?

Options:

A.

Implement network based antivirus.

B.

Place a honey pot in the DMZ.

C.

Shorten the timeout for connection attempts.

D.

Implement a strong password policy.

Buy Now
Questions 29

James works as a Database Administrator for Techsoft Inc. The company has a SQL Server 2005 computer. The computer has a database named Sales. Users complain that the performance of the database has deteriorated. James opens the System Monitor tool and finds that there is an increase in network traffic. What kind of attack might be the cause of the performance deterioration?

Options:

A.

Denial-of-Service

B.

Injection

C.

Internal attack

D.

Virus

Buy Now
Questions 30

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

Options:

A.

Shoulder surfing

B.

File integrity auditing

C.

Reconnaissance

D.

Spoofing

Buy Now
Questions 31

Which of the following refers to applications or files that are not classified as viruses or Trojan horse programs, but can still negatively affect the performance of the computers on your network and introduce significant security risks to your organization?

Options:

A.

Hardware

B.

Grayware

C.

Firmware

D.

Melissa

Buy Now
Questions 32

John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.

Original cookie values:

ItemID1=2

ItemPrice1=900

ItemID2=1

ItemPrice2=200

Modified cookie values:

ItemID1=2

ItemPrice1=1

ItemID2=1

ItemPrice2=1

Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.

Which of the following hacking techniques is John performing?

Options:

A.

Computer-based social engineering

B.

Man-in-the-middle attack

C.

Cross site scripting

D.

Cookie poisoning

Buy Now
Questions 33

Which of the following statements is true about the difference between worms and Trojan horses?

Options:

A.

Trojan horses are a form of malicious codes while worms are not.

B.

Trojan horses are harmful to computers while worms are not.

C.

Worms can be distributed through emails while Trojan horses cannot.

D.

Worms replicate themselves while Trojan horses do not.

Buy Now
Questions 34

Which of the following are the automated tools that are used to perform penetration testing?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Pwdump

B.

Nessus

C.

EtherApe

D.

GFI LANguard

Buy Now
Questions 35

Which of the following netcat parameters makes netcat a listener that automatically restarts itself when a connection is dropped?

Options:

A.

-u

B.

-l

C.

-p

D.

-L

Buy Now
Questions 36

Adam works as a Penetration Tester for Umbrella Inc. A project has been assigned to him check the security of wireless network of the company. He re-injects a captured wireless packet back onto the network. He does this hundreds of times within a second. The packet is correctly encrypted and Adam assumes it is an ARP request packet. The wireless host responds with a stream of responses, all individually encrypted with different IVs.

Which of the following types of attack is Adam performing?

Options:

A.

Replay attack

B.

MAC Spoofing attack

C.

Caffe Latte attack

D.

Network injection attack

Buy Now
Questions 37

You discover that your network routers are being flooded with broadcast packets that have the return address of one of the servers on your network. This is resulting in an overwhelming amount of traffic going back to that server and flooding it. What is this called?

Options:

A.

Syn flood

B.

Blue jacking

C.

Smurf attack

D.

IP spoofing

Buy Now
Questions 38

You work as a Network Administrator for Marioxnet Inc. You have the responsibility of handling two routers with BGP protocol for the enterprise's network. One of the two routers gets flooded with an unexpected number of data packets, while the other router starves with no packets reaching it. Which of the following attacks can be a potential cause of this?

Options:

A.

Packet manipulation

B.

Denial-of-Service

C.

Spoofing

D.

Eavesdropping

Buy Now
Questions 39

You work as a Network Penetration tester in the Secure Inc. Your company takes the projects to test the security of various companies. Recently, Secure Inc. has assigned you a project to test the security of a Web site. You go to the Web site login page and you run the following SQL query:

SELECT email, passwd, login_id, full_name

FROM members

WHERE email = 'attacker@somehwere.com'; DROP TABLE members; --'

What task will the above SQL query perform?

Options:

A.

Deletes the database in which members table resides.

B.

Deletes the rows of members table where email id is 'attacker@somehwere.com' given.

C.

Performs the XSS attacks.

D.

Deletes the entire members table.

Buy Now
Questions 40

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Eradication

B.

Contamination

C.

Preparation

D.

Recovery

E.

Identification

Buy Now
Questions 41

Which of the following protocols uses only User Datagram Protocol (UDP)?

Options:

A.

POP3

B.

FTP

C.

ICMP

D.

TFTP

Buy Now
Questions 42

When you conduct the XMAS scanning using Nmap, you find that most of the ports scanned do not give a response. What can be the state of these ports?

Options:

A.

Filtered

B.

Open

C.

Closed

Buy Now
Questions 43

Which of the following Linux rootkits allows an attacker to hide files, processes, and network connections?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Phalanx2

B.

Beastkit

C.

Adore

D.

Knark

Buy Now
Questions 44

Which of the following options scans the networks for vulnerabilities regarding the security of a network?

Options:

A.

System enumerators

B.

Port enumerators

C.

Network enumerators

D.

Vulnerability enumerators

Buy Now
Questions 45

You discover that all available network bandwidth is being used by some unknown service. You discover that UDP packets are being used to connect the echo service on one machine to the chargen service on another machine. What kind of attack is this?

Options:

A.

Smurf

B.

Denial of Service

C.

Evil Twin

D.

Virus

Buy Now
Questions 46

You have forgotten your password of an online shop. The web application of that online shop asks you to enter your email so that they can send you a new password. You enter your email

you@gmail.com

And press the submit button.

The Web application displays the server error. What can be the reason of the error?

Options:

A.

You have entered any special character in email.

B.

Email entered is not valid.

C.

The remote server is down.

D.

Your internet connection is slow.

Buy Now
Questions 47

Which of the following statements are true regarding SYN flood attack?

Options:

A.

The attacker sends a succession of SYN requests to a target system.

B.

SYN flood is a form of Denial-of-Service (DoS) attack.

C.

The attacker sends thousands and thousands of ACK packets to the victim.

D.

SYN cookies provide protection against the SYN flood by eliminating the resources allocated on the target host.

Buy Now
Questions 48

Which of the following statements about buffer overflow are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is a situation that occurs when a storage device runs out of space.

B.

It is a situation that occurs when an application receives more data than it is configured to accept.

C.

It can improve application performance.

D.

It can terminate an application.

Buy Now
Questions 49

Which of the following tools are used as a network traffic monitoring tool in the Linux operating system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Netbus

B.

IPTraf

C.

MRTG

D.

Ntop

Buy Now
Exam Code: GCIH
Exam Name: GIAC Certified Incident Handler
Last Update: Dec 22, 2024
Questions: 328

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99