Best Quality of GCIH practice question materials and free demo for GIAC certification for customers, Real Success Guaranteed with Updated GCIH pdf dumps vce Materials. 100% PASS GIAC Certified Incident Handler exam Today!

GIAC GCIH Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1
Which of the following statements are true about worms?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Worms cause harm to the network by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
  • B. Worms can exist inside files such as Word or Excel documents.
  • C. One feature of worms is keystroke logging.
  • D. Worms replicate themselves from one system to another without using a host file.

Answer: ABD

NEW QUESTION 2
Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.


Solution:


Does this meet the goal?
  • A. Yes
  • B. Not Mastered

Answer: A

NEW QUESTION 3
Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server. Which of the following DoS attacks is Maria using to accomplish her task?

  • A. Ping flood attack
  • B. Fraggle DoS attack
  • C. Teardrop attack
  • D. Smurf DoS attack

Answer: B

NEW QUESTION 4
OutGuess is used for __________ attack.

  • A. Steganography
  • B. Web password cracking
  • C. SQL injection
  • D. Man-in-the-middle

Answer: A

NEW QUESTION 5
Which of the following are the automated tools that are used to perform penetration testing?
Each correct answer represents a complete solution. Choose two.

  • A. Pwdump
  • B. Nessus
  • C. EtherApe
  • D. GFI LANguard

Answer: BD

NEW QUESTION 6
Which of the following attacks can be overcome by applying cryptography?

  • A. Buffer overflow
  • B. Web ripping
  • C. Sniffing
  • D. DoS

Answer: C

NEW QUESTION 7
Which of the following are the limitations for the cross site request forgery (CSRF) attack?
Each correct answer represents a complete solution. Choose all that apply.

  • A. The attacker must determine the right values for all the form inputs.
  • B. The attacker must target a site that doesn't check the referrer header.
  • C. The target site should have limited lifetime authentication cookies.
  • D. The target site should authenticate in GET and POST parameters, not only cookies.

Answer: AB

NEW QUESTION 8
Choose the correct six -step process of threat modeling from the list of different steps.
GCIH dumps exhibit


Solution:
GCIH dumps exhibit

Does this meet the goal?
  • A. Yes
  • B. Not Mastered

Answer: A

NEW QUESTION 9
Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denialof-service, or unauthorized changes to system hardware, software, or data?

  • A. Disaster Recovery Plan
  • B. Cyber Incident Response Plan
  • C. Crisis Communication Plan
  • D. Occupant Emergency Plan

Answer: B

NEW QUESTION 10
You want to integrate the Nikto tool with nessus vulnerability scanner. Which of the following steps will you take to accomplish the task?
Each correct answer represents a complete solution. Choose two.

  • A. Place nikto.pl file in the /etc/nessus directory.
  • B. Place nikto.pl file in the /var/www directory.
  • C. Place the directory containing nikto.pl in root's PATH environment variable.
  • D. Restart nessusd service.

Answer: CD

NEW QUESTION 11
Which of the following refers to applications or files that are not classified as viruses or Trojan horse programs, but can still negatively affect the performance of the computers on your network and introduce significant security risks to your organization?

  • A. Hardware
  • B. Grayware
  • C. Firmware
  • D. Melissa

Answer: B

NEW QUESTION 12
CORRECT TEXT
Fill in the blank with the appropriate name of the attack.
______ takes best advantage of an existing authenticated connection

  • A.

Answer: sessionhijacking

NEW QUESTION 13
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. An attacker uses software that keeps trying password combinations until the correct password is found. Which type of attack is this?

  • A. Denial-of-Service
  • B. Man-in-the-middle
  • C. Brute Force
  • D. Vulnerability

Answer: C

NEW QUESTION 14
Which of the following characters will you use to check whether an application is vulnerable to an SQL injection attack?

  • A. Dash (-)
  • B. Double quote (")
  • C. Single quote (')
  • D. Semi colon (;)

Answer: C

NEW QUESTION 15
You enter the netstat -an command in the command prompt and you receive intimation that port number 7777 is open on your computer. Which of the following Trojans may be installed on your computer?

  • A. NetBus
  • B. QAZ
  • C. Donald Dick
  • D. Tini

Answer: D

NEW QUESTION 16
You are concerned about rootkits on your network communicating with attackers outside your network. Without using an IDS how can you detect this sort of activity?

  • A. By examining your domain controller server logs.
  • B. You cannot, you need an IDS.
  • C. By examining your firewall logs.
  • D. By setting up a DMZ.

Answer: C

NEW QUESTION 17
......

P.S. Dumpscollection.com now are offering 100% pass ensure GCIH dumps! All GCIH exam questions have been updated with correct answers: https://www.dumpscollection.net/dumps/GCIH/ (328 New Questions)