GCIH Exam Questions - Online Test


GCIH Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

Master the GCIH GIAC Certified Incident Handler content and be ready for exam day success quickly with this Passleader GCIH exam. We guarantee it!We make it a reality and give you real GCIH questions in our GIAC GCIH braindumps.Latest 100% VALID GIAC GCIH Exam Questions Dumps at below page. You can use our GIAC GCIH braindumps and pass your exam.

GIAC GCIH Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1
Which of the following wireless network security solutions refers to an authentication process in which a user can connect wireless access points to a centralized server to ensure that all hosts are properly authenticated?

  • A. Remote Authentication Dial-In User Service (RADIUS)
  • B. IEEE 802.1x
  • C. Wired Equivalent Privacy (WEP)
  • D. Wi-Fi Protected Access 2 (WPA2)

Answer: B

NEW QUESTION 2
Which of the following tools is used to attack the Digital Watermarking?

  • A. Active Attacks
  • B. 2Mosaic
  • C. Steg-Only Attack
  • D. Gifshuffle

Answer: B

NEW QUESTION 3
You discover that your network routers are being flooded with broadcast packets that have the return address of one of the servers on your network. This is resulting in an overwhelming amount of traffic going back to that server and flooding it. What is this called?

  • A. Syn flood
  • B. Blue jacking
  • C. Smurf attack
  • D. IP spoofing

Answer: C

NEW QUESTION 4
Which of the following is used to gather information about a remote network protected by a firewall?

  • A. Warchalking
  • B. Wardialing
  • C. Firechalking
  • D. Firewalking

Answer: D

NEW QUESTION 5
Adam works as a Security Administrator for Umbrella Technology Inc. He reported a breach in security to his senior members, stating that "security defenses has been breached and exploited for 2 weeks by hackers." The hackers had accessed and downloaded 50,000 addresses containing customer credit cards and passwords. Umbrella Technology was looking to law enforcement officials to protect their intellectual property.
The intruder entered through an employee's home machine, which was connected to Umbrella Technology's corporate VPN network. The application called BEAST Trojan was used in the attack to open a "back door" allowing the hackers undetected access. The security breach was discovered when customers complained about the usage of their credit cards without their knowledge.
The hackers were traced back to Shanghai, China through e-mail address evidence. The credit card information was sent to that same e-mail address. The passwords allowed the hackers to access Umbrella Technology's network from a remote location, posing as employees.
Which of the following actions can Adam perform to prevent such attacks from occurring in future?

  • A. Allow VPN access but replace the standard authentication with biometric authentication
  • B. Replace the VPN access with dial-up modem access to the company's network
  • C. Disable VPN access to all employees of the company from home machines
  • D. Apply different security policy to make passwords of employees more complex

Answer: C

NEW QUESTION 6
Which of the following attacks allows an attacker to sniff data frames on a local area network (LAN) or stop the traffic altogether?

  • A. Port scanning
  • B. ARP spoofing
  • C. Man-in-the-middle
  • D. Session hijacking

Answer: B

NEW QUESTION 7
Which of the following languages are vulnerable to a buffer overflow attack?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Java
  • B. C++
  • C. C
  • D. Action script

Answer: BC

NEW QUESTION 8
Mark works as a Network Administrator for NetTech Inc. The network has 150 Windows 2000 Professional client computers and four Windows 2000 servers. All the client computers are able to connect to the Internet. Mark is concerned about malware infecting the client computers through the Internet. What will Mark do to protect the client computers from malware?
Each correct answer represents a complete solution. Choose two.

  • A. Educate users of the client computers to avoid malware.
  • B. Educate users of the client computers about the problems arising due to malware.
  • C. Prevent users of the client computers from executing any programs.
  • D. Assign Read-Only permission to the users for accessing the hard disk drives of the client computers.

Answer: AB

NEW QUESTION 9
Which of the following tasks can be performed by using netcat utility?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Checking file integrity
  • B. Creating a Backdoor
  • C. Firewall testing
  • D. Port scanning and service identification

Answer: BCD

NEW QUESTION 10
Which of the following options scans the networks for vulnerabilities regarding the security of a network?

  • A. System enumerators
  • B. Port enumerators
  • C. Network enumerators
  • D. Vulnerability enumerators

Answer: C

NEW QUESTION 11
CORRECT TEXT
Fill in the blank with the appropriate term.
______ is a technique used to make sure that incoming packets are actually from the networks that they claim to be from.

  • A.

Answer: Ingressfiltering

NEW QUESTION 12
John works as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company uses Check Point SmartDefense to provide security to the network of the company. On the HTTP servers of the company, John defines a rule for dropping any kind of userdefined URLs. Which of the following types of attacks can be prevented by dropping the user- defined URLs?

  • A. Morris worm
  • B. Code red worm
  • C. Hybrid attacks
  • D. PTC worms and mutations

Answer: D

NEW QUESTION 13
Address Resolution Protocol (ARP) spoofing, also known as ARP poisoning or ARP Poison Routing (APR), is a technique used to attack an Ethernet wired or wireless network. ARP spoofing may allow an attacker to sniff data frames on a local area network (LAN), modify the traffic, or stop the traffic altogether. The principle of ARP spoofing is to send fake ARP messages to an Ethernet LAN. What steps can be used as a countermeasure of ARP spoofing?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Using smash guard utility
  • B. Using ARP Guard utility
  • C. Using static ARP entries on servers, workstation and routers
  • D. Using ARP watch utility
  • E. Using IDS Sensors to check continually for large amount of ARP traffic on local subnets

Answer: BCDE

NEW QUESTION 14
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure server. The output of the scanning test is as follows:
C:\whisker.pl -h target_IP_address
-- whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - =
= Host: target_IP_address
= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1
mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22
+ 200 OK: HEAD /cgi-bin/printenv
John recognizes /cgi-bin/printenv vulnerability ('Printenv' vulnerability) in the We_are_secure server. Which of the following statements about 'Printenv' vulnerability are true?
Each correct answer represents a complete solution. Choose all that apply.

  • A. This vulnerability helps in a cross site scripting attack.
  • B. 'Printenv' vulnerability maintains a log file of user activities on the Website, which may be useful for the attacker.
  • C. The countermeasure to 'printenv' vulnerability is to remove the CGI script.
  • D. With the help of 'printenv' vulnerability, an attacker can input specially crafted links and/or other malicious scripts.

Answer: ACD

NEW QUESTION 15
Which of the following refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open?

  • A. Spoofing
  • B. Hacking
  • C. SYN attack
  • D. PING attack

Answer: C

NEW QUESTION 16
You work as a Security Administrator for Net Perfect Inc. The company has a Windows-based network. You want to use a scanning technique which works as a reconnaissance attack. The technique should direct to a specific host or network to determine the services that the host offers.
Which of the following scanning techniques can you use to accomplish the task?

  • A. IDLE scan
  • B. Nmap
  • C. SYN scan
  • D. Host port scan

Answer: D

NEW QUESTION 17
Adam works as a Security administrator for Umbrella Inc. He runs the following traceroute and notices that hops 19 and 20 both show the same IP address.
1 172.16.1.254 (172.16.1.254) 0.724 ms 3.285 ms 0.613 ms 2 ip68-98-176-1.nv.nv.cox.net
(68.98.176.1) 12.169 ms 14.958 ms 13.416 ms 3 ip68-98-176-1.nv.nv.cox.net
(68.98.176.1) 13.948 ms ip68-100-0-1.nv.nv. cox.net (68.100.0.1) 16.743 ms 16.207 ms 4 ip68- 100-0-137.nv.nv.cox.net (68.100.0.137) 17.324 ms 13.933 ms 20.938 ms 5 68.1.1.4
(68.1.1.4) 12.439 ms 220.166 ms 204.170 ms
6 so-6-0-0.gar2.wdc1.Level3.net (67.29.170.1) 16.177 ms 25.943 ms 14.104 ms 7
unknown.Level3.net (209.247.9.173) 14.227 ms 17.553 ms 15.415 ms "Exambible" - 8 so-0-1- 0.bbr1.NewYork1.level3.net (64.159.1.41) 17.063 ms 20.960 ms 19.512 ms 9 so-7-0-0.gar1.
NewYork1.Level3.net (64.159.1.182) 20.334 ms 19.440 ms 17.938 ms 10 so-4-0- 0.edge1.NewYork1.Level3.
net (209.244.17.74) 27.526 ms 18.317 ms 21.202 ms 11 uunet-level3- oc48.NewYork1.Level3.net
(209.244.160.12) 21.411 ms 19.133 ms 18.830 ms 12 0.so-6-0-0.XL1.NYC4.ALTER.NET (152.63.21.78)


Solution:


Does this meet the goal?
  • A. Yes
  • B. Not Mastered

Answer: A

NEW QUESTION 18
......

100% Valid and Newest Version GCIH Questions & Answers shared by Dumps-files.com, Get Full Dumps HERE: https://www.dumps-files.com/files/GCIH/ (New 328 Q&As)