It is more faster and easier to pass the GIAC GCIH exam by using Vivid GIAC GIAC Certified Incident Handler questuins and answers. Immediate access to the Down to date GCIH Exam and find the same core area GCIH questions with professionally verified answers, then PASS your exam with a high score now.
GIAC GCIH Free Dumps Questions Online, Read and Test Now.
NEW QUESTION 1
Which of the following rootkits adds additional code or replaces portions of an operating system, including both the kernel and associated device drivers?
Answer: C
NEW QUESTION 2
Which of the following is the method of hiding data within another media type such as graphic or document?
Answer: B
NEW QUESTION 3
You see the career section of a company's Web site and analyze the job profile requirements. You conclude that the company wants professionals who have a sharp knowledge of Windows server 2003 and Windows active directory installation and placement. Which of the following steps are you using to perform hacking?
Answer: C
NEW QUESTION 4
You are monitoring your network's behavior. You find a sudden increase in traffic on the network. It seems to come in bursts and emanate from one specific machine. You have been able to determine that a user of that machine is unaware of the activity and lacks the computer knowledge required to be responsible for a computer attack. What attack might this indicate?
Answer: A
NEW QUESTION 5
Adam, a novice computer user, works primarily from home as a medical professional. He just bought a brand new Dual Core Pentium computer with over 3 GB of RAM. After about two months of working on his new computer, he notices that it is not running nearly as fast as it used to. Adam uses antivirus software, anti-spyware software, and keeps the computer up-to-date with Microsoft patches. After another month of working on the computer, Adam finds that his computer is even more noticeably slow. He also notices a window or two pop-up on his screen, but they quickly disappear. He has seen these windows show up, even when he has not been on the Internet. Adam notices that his computer only has about 10 GB of free space available. Since his hard drive is a 200 GB hard drive, Adam thinks this is very odd.
Which of the following is the mostly likely the cause of the problem?
Answer: A
NEW QUESTION 6
Adam works as an Incident Handler for Umbrella Inc. He is informed by the senior authorities that the server of the marketing department has been affected by a malicious hacking attack. Supervisors are also claiming that some sensitive data are also stolen.
Adam immediately arrived to the server room of the marketing department and identified the event as an incident. He isolated the infected network from the remaining part of the network and started preparing to image the entire system. He captures volatile data, such as running process, ram, and network connections.
Which of the following steps of the incident handling process is being performed by Adam?
Answer: D
NEW QUESTION 7
CORRECT TEXT
Fill in the blank with the appropriate term.
_______is the practice of monitoring and potentially restricting the flow of information outbound from one network to another
Answer: Egressfiltering
NEW QUESTION 8
Which of the following techniques is used when a system performs the penetration testing with the objective of accessing unauthorized information residing inside a computer?
Answer: D
NEW QUESTION 9
Which of the following statements about buffer overflow is true?
Answer: C
NEW QUESTION 10
You run the following PHP script:
<?php $name = mysql_real_escape_string($_POST["name"]);
$password = mysql_real_escape_string($_POST["password"]); ?>
What is the use of the mysql_real_escape_string() function in the above script.
Each correct answer represents a complete solution. Choose all that apply.
Answer: BD
NEW QUESTION 11
5.2.92:4079 ---------FIN--------->192.5.2.110:23192.5.2.92:4079 <----NO RESPONSE---
---192.5.2.110:23
Scan directed at closed port:
ClientServer
Answer: A
NEW QUESTION 12
You work as a Network Administrator for Marioxnet Inc. You have the responsibility of handling two routers with BGP protocol for the enterprise's network. One of the two routers gets flooded with an unexpected number of data packets, while the other router starves with no packets reaching it. Which of the following attacks can be a potential cause of this?
Answer: B
NEW QUESTION 13
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He enters a single quote in the input field of the login page of the We- are-secure Web site and receives the following error message:
Microsoft OLE DB Provider for ODBC Drivers error '0x80040E14'
This error message shows that the We-are-secure Website is vulnerable to __________.
Answer: C
NEW QUESTION 14
Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.
What is the name of this library?
Answer: C
NEW QUESTION 15
Which of the following tools is used to download the Web pages of a Website on the local system?
Answer: A
NEW QUESTION 16
Which of the following statements are true about session hijacking?
Each correct answer represents a complete solution. Choose all that apply.
Answer: ACD
NEW QUESTION 17
Which of the following attacks is specially used for cracking a password?
Answer: B
NEW QUESTION 18
......
P.S. Dumps-files.com now are offering 100% pass ensure GCIH dumps! All GCIH exam questions have been updated with correct answers: https://www.dumps-files.com/files/GCIH/ (328 New Questions)