Exambible offers free demo for GCIH exam. "GIAC Certified Incident Handler", also known as GCIH exam, is a GIAC Certification. This set of posts, Passing the GIAC GCIH exam, will help you answer those questions. The GCIH Questions & Answers covers all the knowledge points of the real exam. 100% real GIAC GCIH exams and revised by experts!
Check GCIH free dumps before getting the full version:
NEW QUESTION 1
Which of the following is a technique for creating Internet maps?
Each correct answer represents a complete solution. Choose two.
Answer: AB
NEW QUESTION 2
910 ms 15 0.so-7-0-0.XL1.MIA4.ALTER.NET (152.63.86.189) 51.165 ms 49.935 ms
Answer: A
NEW QUESTION 3
Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover.
Which of the following Steganography methods is Victor using to accomplish the task?
Answer: A
NEW QUESTION 4
Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?
Answer: C
NEW QUESTION 5
Which of the following tools can be used to perform brute force attack on a remote database?
Each correct answer represents a complete solution. Choose all that apply.
Answer: ABC
NEW QUESTION 6
Which of the following types of rootkits replaces regular application binaries with Trojan fakes and modifies the behavior of existing applications using hooks, patches, or injected code?
Answer: A
NEW QUESTION 7
Which of the following is the most common vulnerability that can affect desktop applications written in native code?
Answer: D
NEW QUESTION 8
In which of the following malicious hacking steps does email tracking come under?
Answer: A
NEW QUESTION 9
You have inserted a Trojan on your friend's computer and you want to put it in the startup so that whenever the computer reboots the Trojan will start to run on the startup. Which of the following registry entries will you edit to accomplish the task?
Answer: C
NEW QUESTION 10
Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to perform hacking. Which of the following steps is NOT included in the hacking process?
Answer: B
NEW QUESTION 11
Which of the following are used to identify who is responsible for responding to an incident?
Answer: D
NEW QUESTION 12
Which of the following is the best method of accurately identifying the services running on a victim host?
Answer: A
NEW QUESTION 13
Which of the following tools is described in the statement given below?
"It has a database containing signatures to be able to detect hundreds of vulnerabilities in UNIX, Windows, and commonly used web CGI scripts. Moreover, the database detects DdoS zombies and Trojans as well."
Answer: B
NEW QUESTION 14
Which of the following is the difference between SSL and S-HTTP?
Answer: D
NEW QUESTION 15
Firekiller 2000 is an example of a __________.
Answer: A
NEW QUESTION 16
John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?
Answer: B
NEW QUESTION 17
As a professional hacker, you want to crack the security of secureserver.com. For this, in the information gathering step, you performed scanning with the help of nmap utility to retrieve as many different protocols as possible being used by the secureserver.com so that you could get the accurate knowledge about what services were being used by the secure server.com. Which of the following nmap switches have you used to accomplish the task?
Answer: D
NEW QUESTION 18
......
Recommend!! Get the Full GCIH dumps in VCE and PDF From Certleader, Welcome to Download: https://www.certleader.com/GCIH-dumps.html (New 328 Q&As Version)