Want to know Pass4sure GCIH Exam practice test features? Want to lear more about GIAC GIAC Certified Incident Handler certification experience? Study Printable GIAC GCIH answers to Most up-to-date GCIH questions at Pass4sure. Gat a success with an absolute guarantee to pass GIAC GCIH (GIAC Certified Incident Handler) test on your first attempt.
Online GCIH free questions and answers of New Version:
NEW QUESTION 1
Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denialof-service, or unauthorized changes to system hardware, software, or data?
Answer: B
NEW QUESTION 2
You are concerned about rootkits on your network communicating with attackers outside your network. Without using an IDS how can you detect this sort of activity?
Answer: C
NEW QUESTION 3
Which of the following refers to applications or files that are not classified as viruses or Trojan horse programs, but can still negatively affect the performance of the computers on your network and introduce significant security risks to your organization?
Answer: B
NEW QUESTION 4
In which of the following scanning methods do Windows operating systems send only RST packets irrespective of whether the port is open or closed?
Answer: A
NEW QUESTION 5
Your network is being flooded by ICMP packets. When you trace them down they come from multiple different IP addresses. What kind of attack is this?
Answer: D
NEW QUESTION 6
When you conduct the XMAS scanning using Nmap, you find that most of the ports scanned do not give a response. What can be the state of these ports?
Answer: B
NEW QUESTION 7
Buffer overflows are one of the major errors used for exploitation on the Internet today. A buffer overflow occurs when a particular operation/function writes more data into a variable than the variable was designed to hold.
Which of the following are the two popular types of buffer overflows?
Each correct answer represents a complete solution. Choose two.
Answer: BC
NEW QUESTION 8
Which of the following is a technique of using a modem to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for computers, Bulletin board systems, and fax machines?
Answer: D
NEW QUESTION 9
Which of the following techniques can be used to map 'open' or 'pass through' ports on a gateway?
Answer: D
NEW QUESTION 10
Alice wants to prove her identity to Bob. Bob requests her password as proof of identity, which Alice dutifully provides (possibly after some transformation like a hash function); meanwhile, Eve is eavesdropping the conversation and keeps the password. After the interchange is over, Eve connects to Bob posing as Alice; when asked for a proof of identity, Eve sends Alice's password read from the last session, which Bob accepts. Which of the following attacks is being used by Eve?
Answer: A
NEW QUESTION 11
What is the major difference between a worm and a Trojan horse?
Answer: C
NEW QUESTION 12
Which of the following are the rules by which an organization operates?
Answer: B
NEW QUESTION 13
Which of the following are open-source vulnerability scanners?
Answer: ABD
NEW QUESTION 14
Which of the following statements are true about session hijacking?
Each correct answer represents a complete solution. Choose all that apply.
Answer: ACD
NEW QUESTION 15
You are responsible for security at a company that uses a lot of Web applications. You are most concerned about flaws in those applications allowing some attacker to get into your network. What method would be best for finding such flaws?
Answer: D
NEW QUESTION 16
......
Thanks for reading the newest GCIH exam dumps! We recommend you to try the PREMIUM DumpSolutions.com GCIH dumps in VCE and PDF here: https://www.dumpsolutions.com/GCIH-dumps/ (328 Q&As Dumps)