GCIH Exam Questions - Online Test


GCIH Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

Exambible offers free demo for GCIH exam. "GIAC Certified Incident Handler", also known as GCIH exam, is a GIAC Certification. This set of posts, Passing the GIAC GCIH exam, will help you answer those questions. The GCIH Questions & Answers covers all the knowledge points of the real exam. 100% real GIAC GCIH exams and revised by experts!

Check GCIH free dumps before getting the full version:

NEW QUESTION 1
Which of the following is a technique for creating Internet maps?
Each correct answer represents a complete solution. Choose two.

  • A. Active Probing
  • B. AS PATH Inference
  • C. Object Relational Mapping
  • D. Network Quota

Answer: AB

NEW QUESTION 2
910 ms 15 0.so-7-0-0.XL1.MIA4.ALTER.NET (152.63.86.189) 51.165 ms 49.935 ms


Solution:


Does this meet the goal?
  • A. Yes
  • B. Not Mastered

Answer: A

NEW QUESTION 3
Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover.
Which of the following Steganography methods is Victor using to accomplish the task?

  • A. The distortion technique
  • B. The spread spectrum technique
  • C. The substitution technique
  • D. The cover generation technique

Answer: A

NEW QUESTION 4
Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?

  • A. Fraggle
  • B. Ping flood
  • C. Bonk
  • D. Smurf

Answer: C

NEW QUESTION 5
Which of the following tools can be used to perform brute force attack on a remote database?
Each correct answer represents a complete solution. Choose all that apply.

  • A. SQLBF
  • B. SQLDict
  • C. FindSA
  • D. nmap

Answer: ABC

NEW QUESTION 6
Which of the following types of rootkits replaces regular application binaries with Trojan fakes and modifies the behavior of existing applications using hooks, patches, or injected code?

  • A. Application level rootkit
  • B. Hypervisor rootkit
  • C. Kernel level rootkit
  • D. Boot loader rootkit

Answer: A

NEW QUESTION 7
Which of the following is the most common vulnerability that can affect desktop applications written in native code?

  • A. SpyWare
  • B. DDoS attack
  • C. Malware
  • D. Buffer overflow

Answer: D

NEW QUESTION 8
In which of the following malicious hacking steps does email tracking come under?

  • A. Reconnaissance
  • B. Gaining access
  • C. Maintaining Access
  • D. Scanning

Answer: A

NEW QUESTION 9
You have inserted a Trojan on your friend's computer and you want to put it in the startup so that whenever the computer reboots the Trojan will start to run on the startup. Which of the following registry entries will you edit to accomplish the task?

  • A. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Startup
  • B. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Auto
  • C. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
  • D. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Start

Answer: C

NEW QUESTION 10
Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to perform hacking. Which of the following steps is NOT included in the hacking process?

  • A. Scanning
  • B. Preparation
  • C. gaining access
  • D. Reconnaissance

Answer: B

NEW QUESTION 11
Which of the following are used to identify who is responsible for responding to an incident?

  • A. Disaster management policies
  • B. Incident response manuals
  • C. Disaster management manuals
  • D. Incident response policies

Answer: D

NEW QUESTION 12
Which of the following is the best method of accurately identifying the services running on a victim host?

  • A. Use of the manual method of telnet to each of the open ports.
  • B. Use of a port scanner to scan each port to confirm the services running.
  • C. Use of hit and trial method to guess the services and ports of the victim host.
  • D. Use of a vulnerability scanner to try to probe each port to verify which service is running.

Answer: A

NEW QUESTION 13
Which of the following tools is described in the statement given below?
"It has a database containing signatures to be able to detect hundreds of vulnerabilities in UNIX, Windows, and commonly used web CGI scripts. Moreover, the database detects DdoS zombies and Trojans as well."

  • A. SARA
  • B. Nessus
  • C. Anti-x
  • D. Nmap

Answer: B

NEW QUESTION 14
Which of the following is the difference between SSL and S-HTTP?

  • A. SSL operates at the application layer and S-HTTP operates at the network layer.
  • B. SSL operates at the application layer and S-HTTP operates at the transport layer.
  • C. SSL operates at the network layer and S-HTTP operates at the application layer.
  • D. SSL operates at the transport layer and S-HTTP operates at the application layer.

Answer: D

NEW QUESTION 15
Firekiller 2000 is an example of a __________.

  • A. Security software disabler Trojan
  • B. DoS attack Trojan
  • C. Data sending Trojan
  • D. Remote access Trojan

Answer: A

NEW QUESTION 16
John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following techniques is he performing to accomplish his task?

  • A. Email spoofing
  • B. Steganography
  • C. Web ripping
  • D. Social engineering

Answer: B

NEW QUESTION 17
As a professional hacker, you want to crack the security of secureserver.com. For this, in the information gathering step, you performed scanning with the help of nmap utility to retrieve as many different protocols as possible being used by the secureserver.com so that you could get the accurate knowledge about what services were being used by the secure server.com. Which of the following nmap switches have you used to accomplish the task?

  • A. nmap -vO
  • B. nmap -sS
  • C. nmap -sT
  • D. nmap -sO

Answer: D

NEW QUESTION 18
......

Recommend!! Get the Full GCIH dumps in VCE and PDF From Certleader, Welcome to Download: https://www.certleader.com/GCIH-dumps.html (New 328 Q&As Version)