The most important thing for good preparation is the appropriate and suitable choice of study material. Our experts have done an endeavor to help IT candidates providing a fully valid and authentic study guide. GIAC GCIH exam dumps has largely affected the students’ results and have paved their way towards a bright career. This valuable help is available at RealExamCollection. It can be downloaded in PDF by paying a cheap price.
Actual GIAC GCIH Exam Questions - Latest GCIH Dumps RealExamCollection.com
GIA C
Exam GCIH
GIAC Certified Incident Handler
Verson: Demo
[ Total Questions: 10 ]
https://www.realexamcollection.com/giac/gcih-dumps.html
GIAC GCIH : Practice Test
Topic 1, Volume A
Question No : 1 - (Topic 1)
Which of the following are the primary goals of the incident handling team?
Each correct answer represents a complete solution. Choose all that apply.
A. Freeze the scene.
B. Repair any damage caused by an incident.
C. Prevent any further damage.
D. Inform higher authorities.
Answer: A,B,C
Question No : 2 - (Topic 1)
Which of the following attacks is specially used for cracking a password?
A. PING attack
B. Dictionary attack
C. Vulnerability attack
D. DoS attack
Answer: B
Question No : 3 - (Topic 1)
John works as a professional Ethical Hacker. He has been assigned a project to test the
security of www.we-are-secure.com. He performs Web vulnerability scanning on the We-
are-secure server. The output of the scanning test is as follows:
C:\whisker.pl -h target_IP_address
-- whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - =
= Host: target_IP_address
3
GIAC GCIH : Practice Test
= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1
mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22
+ 200 OK: HEAD /cgi-bin/printenv
John recognizes /cgi-bin/printenv vulnerability ('Printenv' vulnerability) in the
We_are_secure server. Which of the following statements about 'Printenv' vulnerability are
true?
Each correct answer represents a complete solution. Choose all that apply.
A. This vulnerability helps in a cross site scripting attack.
B. 'Printenv' vulnerability maintains a log file of user activities on the Website, which may
be useful for the attacker.
C. The countermeasure to 'printenv' vulnerability is to remove the CGI script.
D. With the help of 'printenv' vulnerability, an attacker can input specially crafted links
and/or other malicious scripts.
Answer: A,C,D
Question No : 4 - (Topic 1)
Which of the following refers to the exploitation of a valid computer session to gain
unauthorized access to information or services in a computer system?
A. Piggybacking
B. Hacking
C. Session hijacking
D. Keystroke logging
Answer: C
Topic 2, Volume B
Question No : 5 - (Topic 2)
Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target.
The total size of this ICMP packet once reconstructed is over 65,536 bytes. On the basis of
above information, which of the following types of attack is Adam attempting to perform?
4
GIAC GCIH : Practice Test
A. Fraggle attack
B. Ping of death attack
C. SYN Flood attack
D. Land attack
Answer: B
Question No : 6 - (Topic 2)
Which of the following types of attacks is often performed by looking surreptitiously at the
keyboard or monitor of an employee's computer?
A. Buffer-overflow attack
B. Shoulder surfing attack
C. Man-in-the-middle attack
D. Denial-of-Service (DoS) attack
Answer: B
Question No : 7 - (Topic 2)
James works as a Database Administrator for Techsoft Inc. The company has a SQL
Server 2005 computer. The computer has a database named Sales. Users complain that
the performance of the database has deteriorated. James opens the System Monitor tool
and finds that there is an increase in network traffic. What kind of attack might be the cause
of the performance deterioration?
A. Denial-of-Service
B. Injection
C. Internal attack
D. Virus
Answer: A
Question No : 8 - (Topic 2)
Which of the following tools will you use to prevent from session hijacking?
5
GIAC GCIH : Practice Test
Each correct answer represents a complete solution. Choose all that apply.
A. OpenSSH
B. Rlogin
C. Telnet
D. SSL
Answer: A,D
Topic 3, Volume C
Question No : 9 - (Topic 3)
Which of the following types of channels is used by Trojans for communication?
A. Loop channel
B. Open channel
C. Covert channel
D. Overt channel
Answer: C
Question No : 10 - (Topic 3)
Which of the following statements is true about a Trojan engine?
A. It limits the system resource usage.
B. It specifies the signatures that keep a watch for a host or a network sending multiple
packets to a single host or a single network.
C. It specifies events that occur in a related manner within a sliding time interval.
D. It analyzes the nonstandard protocols, such as TFN2K and BO2K.
Answer: D
https://www.realexamcollection.com/giac/gcih-dumps.html
6
Comments