we provide Simulation GIAC GCIH practice exam which are the best for clearing GCIH test, and to get certified by GIAC GIAC Certified Incident Handler. The GCIH Questions & Answers covers all the knowledge points of the real GCIH exam. Crack your GIAC GCIH Exam with latest dumps, guaranteed!
Check GCIH free dumps before getting the full version:
NEW QUESTION 1
Which of the following tools can be used for stress testing of a Web server?
Each correct answer represents a complete solution. Choose two.
Answer: AB
NEW QUESTION 2
Which of the following commands can be used for port scanning?
Answer: B
NEW QUESTION 3
Which of the following tools is used for vulnerability scanning and calls Hydra to launch a dictionary attack?
Answer: B
NEW QUESTION 4
Session splicing is an IDS evasion technique in which an attacker delivers data in multiple small- sized packets to the target computer. Hence, it becomes very difficult for an IDS to detect the attack signatures of such attacks. Which of the following tools can be used to perform session splicing attacks?
Each correct answer represents a complete solution. Choose all that apply.
Answer: AC
NEW QUESTION 5
Your IDS discovers that an intruder has gained access to your system. You immediately stop that access, change passwords for administrative accounts, and secure your network. You discover an odd account (not administrative) that has permission to remotely access the network. What is this most likely?
Answer: C
NEW QUESTION 6
Which of the following types of attacks is only intended to make a computer resource unavailable to its users?
Answer: A
NEW QUESTION 7
Your friend plans to install a Trojan on your computer. He knows that if he gives you a new version of chess.exe, you will definitely install the game on your computer. He picks up a Trojan and joins it to chess.exe. The size of chess.exe was 526,895 bytes originally, and after joining this chess file to the Trojan, the file size increased to 651,823 bytes. When he gives you this new game, you install the infected chess.exe file on your computer. He now performs various malicious tasks on your computer remotely. But you suspect that someone has installed a Trojan on your computer and begin to investigate it. When you enter the netstat command in the command prompt, you get the following results:
C:\WINDOWS>netstat -an | find "UDP" UDP IP_Address:31337 *:*
Now you check the following registry address:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
In the above address, you notice a 'default' key in the 'Name' field having " .exe" value in the corresponding 'Data' field. Which of the following Trojans do you think your friend may have installed on your computer on the basis of the above evidence?
Answer: D
NEW QUESTION 8
Which of the following attacks can be overcome by applying cryptography?
Answer: C
NEW QUESTION 9
Mark works as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company uses Check Point SmartDefense to provide security to the network. Mark uses SmartDefense on the HTTP servers of the company to fix the limitation for the maximum response header length. Which of the following attacks can be blocked by defining this limitation?
Answer: A
NEW QUESTION 10
You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?
Answer: D
NEW QUESTION 11
Which of the following terms describes an attempt to transfer DNS zone data?
Answer: A
NEW QUESTION 12
You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?
Answer: A
NEW QUESTION 13
Which of the following protocols uses only User Datagram Protocol (UDP)?
Answer: D
NEW QUESTION 14
CORRECT TEXT
Fill in the blank with the appropriate name of the attack.
______ takes best advantage of an existing authenticated connection
Answer: sessionhijacking
NEW QUESTION 15
Which of the following tasks can be performed by using netcat utility?
Each correct answer represents a complete solution. Choose all that apply.
Answer: BCD
NEW QUESTION 16
......
Recommend!! Get the Full GCIH dumps in VCE and PDF From Certleader, Welcome to Download: https://www.certleader.com/GCIH-dumps.html (New 328 Q&As Version)