Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the GIAC Security Administration GCIH Questions and answers with ValidTests

Exam GCIH All Questions
Exam GCIH Premium Access

View all detail and faqs for the GCIH exam

Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions
Questions # 11:

In which of the following scanning methods do Windows operating systems send only RST packets irrespective of whether the port is open or closed?

Options:

A.

TCP FIN

B.

FTP bounce

C.

XMAS

D.

TCP SYN

Expert Solution
Questions # 12:

Which of the following tools can be used for steganography?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Image hide

B.

Stegbreak

C.

Snow.exe

D.

Anti-x

Expert Solution
Questions # 13:

You work as a Network Administrator for InformSec Inc. You find that the TCP port number 23476 is open on your server. You suspect that there may be a Trojan named Donald Dick installed on your server. Now you want to verify whether Donald Dick is installed on it or not. For this, you want to know the process running on port 23476, as well as the process id, process name, and the path of the process on your server. Which of the following applications will you most likely use to accomplish the task?

Options:

A.

Tripwire

B.

SubSeven

C.

Netstat

D.

Fport

Expert Solution
Questions # 14:

Which of the following commands is used to access Windows resources from Linux workstation?

Options:

A.

mutt

B.

scp

C.

rsync

D.

smbclient

Expert Solution
Questions # 15:

Which of the following attacks is specially used for cracking a password?

Options:

A.

PING attack

B.

Dictionary attack

C.

Vulnerability attack

D.

DoS attack

Expert Solution
Questions # 16:

Which of the following statements are true about worms?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Worms cause harm to the network by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

B.

Worms can exist inside files such as Word or Excel documents.

C.

One feature of worms is keystroke logging.

D.

Worms replicate themselves from one system to another without using a host file.

Expert Solution
Questions # 17:

In which of the following attacking methods does an attacker distribute incorrect IP address?

Options:

A.

IP spoofing

B.

Mac flooding

C.

DNS poisoning

D.

Man-in-the-middle

Expert Solution
Questions # 18:

Which of the following IP packet elements is responsible for authentication while using IPSec?

Options:

A.

Authentication Header (AH)

B.

Layer 2 Tunneling Protocol (L2TP)

C.

Internet Key Exchange (IKE)

D.

Encapsulating Security Payload (ESP)

Expert Solution
Questions # 19:

Which of the following tools can be used to detect the steganography?

Options:

A.

Dskprobe

B.

Blindside

C.

ImageHide

D.

Snow

Expert Solution
Questions # 20:

Adam, a novice computer user, works primarily from home as a medical professional. He just bought a brand new Dual Core Pentium computer with over 3 GB of RAM. After about two months of working on his new computer, he notices that it is not running nearly as fast as it used to. Adam uses antivirus software, anti-spyware software, and keeps the computer up-to-date with Microsoft patches. After another month of working on the computer, Adam finds that his computer is even more noticeably slow. He also notices a window or two pop-up on his screen, but they quickly disappear. He has seen these windows show up, even when he has not been on the Internet. Adam notices that his computer only has about 10 GB of free space available. Since his hard drive is a 200 GB hard drive, Adam thinks this is very odd.

Which of the following is the mostly likely the cause of the problem?

Options:

A.

Computer is infected with the stealth kernel level rootkit.

B.

Computer is infected with stealth virus.

C.

Computer is infected with the Stealth Trojan Virus.

D.

Computer is infected with the Self-Replication Worm.

Expert Solution
Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions