Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the GIAC Security Administration GCIH Questions and answers with ValidTests

Exam GCIH All Questions
Exam GCIH Premium Access

View all detail and faqs for the GCIH exam

Viewing page 10 out of 10 pages
Viewing questions 91-100 out of questions
Questions # 91:

Which of the following tools will you use to prevent from session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

OpenSSH

B.

Rlogin

C.

Telnet

D.

SSL

Expert Solution
Questions # 92:

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

Options:

A.

Vulnerability attack

B.

Impersonation attack

C.

Social Engineering attack

D.

Denial-of-Service attack

Expert Solution
Questions # 93:

Which of the following penetration testing phases involves reconnaissance or data gathering?

Options:

A.

Attack phase

B.

Pre-attack phase

C.

Post-attack phase

D.

Out-attack phase

Expert Solution
Questions # 94:

Which of the following is executed when a predetermined event occurs?

Options:

A.

Trojan horse

B.

Logic bomb

C.

MAC

D.

Worm

Expert Solution
Questions # 95:

You are hired as a Database Administrator for Jennifer Shopping Cart Inc. You monitor the server health through the System Monitor and found that there is a sudden increase in the number of logins.

Which of the following types of attack has occurred?

Options:

A.

Injection

B.

Virus

C.

Worm

D.

Denial-of-service

Expert Solution
Questions # 96:

You work as a Network Administrator in the SecureTech Inc. The SecureTech Inc. is using Linux-based server. Recently, you have updated the password policy of the company in which the server will disable passwords after four trials. What type of attack do you want to stop by enabling this policy?

Options:

A.

Brute force

B.

Replay

C.

XSS

D.

Cookie poisoning

Expert Solution
Questions # 97:

Which of the following are open-source vulnerability scanners?

Options:

A.

Nessus

B.

Hackbot

C.

NetRecon

D.

Nikto

Expert Solution
Questions # 98:

In which of the following methods does an hacker use packet sniffing to read network traffic between two parties to steal the session cookies?

Options:

A.

Cross-site scripting

B.

Physical accessing

C.

Session fixation

D.

Session sidejacking

Expert Solution
Viewing page 10 out of 10 pages
Viewing questions 91-100 out of questions