getcertified4sure.com

Leading GIAC Certified Incident Handler GCIH Pdf Exam




Want to know Testking GCIH Exam practice test features? Want to lear more about GIAC GIAC Certified Incident Handler certification experience? Study High quality GIAC GCIH answers to Renew GCIH questions at Testking. Gat a success with an absolute guarantee to pass GIAC GCIH (GIAC Certified Incident Handler) test on your first attempt.

Free demo questions for GIAC GCIH Exam Dumps Below:

NEW QUESTION 1
You want to scan your network quickly to detect live hosts by using ICMP ECHO Requests. What type of scanning will you perform to accomplish the task?

  • A. Idle scan
  • B. TCP SYN scan
  • C. XMAS scan
  • D. Ping sweep scan

Answer: D

NEW QUESTION 2
Which of the following malicious software travels across computer networks without the assistance of a user?

  • A. Worm
  • B. Virus
  • C. Hoax
  • D. Trojan horses

Answer: A

NEW QUESTION 3
You work as a System Administrator for Happy World Inc. Your company has a server named uC1 that runs Windows Server 2008. The Windows Server virtualization role service is installed on the uC1 server which hosts one virtual machine that also runs Windows Server 2008. You are required to install a new application on the virtual machine. You need to ensure that in case of a failure of the application installation, you are able to quickly restore the virtual machine to its original state.
Which of the following actions will you perform to accomplish the task?

  • A. Use the Virtualization Management Console to save the state of the virtual machine.
  • B. Log on to the virtual host and create a new dynamically expanding virtual hard disk.
  • C. Use the Virtualization Management Console to create a snapshot of the virtual machine.
  • D. Use the Edit Virtual Hard Disk Wizard to copy the virtual hard disk of the virtual machine.

Answer: C

NEW QUESTION 4
In which of the following methods does an hacker use packet sniffing to read network traffic between two parties to steal the session cookies?

  • A. Cross-site scripting
  • B. Physical accessing
  • C. Session fixation
  • D. Session sidejacking

Answer: D

NEW QUESTION 5
Which of the following ensures that the investigation process of incident response team does not break any laws during the response to an incident?

  • A. Information Security representative
  • B. Lead Investigator
  • C. Legal representative
  • D. Human Resource

Answer: C

NEW QUESTION 6
Which of the following incident response team members ensures that the policies of the organization are enforced during the incident response?

  • A. Information Security representative
  • B. Legal representative
  • C. Human Resource
  • D. Technical representative

Answer: C

NEW QUESTION 7
910 ms 15 0.so-7-0-0.XL1.MIA4.ALTER.NET (152.63.86.189) 51.165 ms 49.935 ms


Solution:


Does this meet the goal?
  • A. Yes
  • B. Not Mastered

Answer: A

NEW QUESTION 8
John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Hybrid attack
  • B. Rule based attack
  • C. Dictionary attack
  • D. Brute Force attack

Answer: ACD

NEW QUESTION 9
Which of the following provides packet-level encryption between hosts in a LAN?

  • A. PPTP
  • B. IPsec
  • C. PFS
  • D. Tunneling protocol

Answer: B

NEW QUESTION 10
Which of the following attacks capture the secret value like a hash and reuse it later to gain access to a system without ever decrypting or decoding the hash?

  • A. Cross Site Scripting attack
  • B. Replay attack
  • C. Rainbow attack
  • D. Hashing attack

Answer: B

NEW QUESTION 11
You discover that all available network bandwidth is being used by some unknown service. You discover that UDP packets are being used to connect the echo service on one machine to the chargen service on another machine. What kind of attack is this?

  • A. Smurf
  • B. Denial of Service
  • C. Evil Twin
  • D. Virus

Answer: B

NEW QUESTION 12
Which of the following is designed to protect the Internet resolvers (clients) from forged DNS data created by DNS cache poisoning?

  • A. Stub resolver
  • B. BINDER
  • C. Split-horizon DNS
  • D. Domain Name System Extension (DNSSEC)

Answer: D

NEW QUESTION 13
John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.
Original cookie values:
ItemID1=2
ItemPrice1=900
ItemID2=1
ItemPrice2=200
Modified cookie values:
ItemID1=2
ItemPrice1=1
ItemID2=1
ItemPrice2=1
Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.
Which of the following hacking techniques is John performing?

  • A. Computer-based social engineering
  • B. Man-in-the-middle attack
  • C. Cross site scripting
  • D. Cookie poisoning

Answer: D

NEW QUESTION 14
Against which of the following does SSH provide protection?
Each correct answer represents a complete solution. Choose two.

  • A. DoS attack
  • B. IP spoofing
  • C. Password sniffing
  • D. Broadcast storm

Answer: BC

NEW QUESTION 15
Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

  • A. Buffer-overflow attack
  • B. Shoulder surfing attack
  • C. Man-in-the-middle attack
  • D. Denial-of-Service (DoS) attack

Answer: B

NEW QUESTION 16
......

100% Valid and Newest Version GCIH Questions & Answers shared by 2passeasy, Get Full Dumps HERE: https://www.2passeasy.com/dumps/GCIH/ (New 328 Q&As)