Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the GIAC Security Administration GCIH Questions and answers with ValidTests

Exam GCIH All Questions
Exam GCIH Premium Access

View all detail and faqs for the GCIH exam

Viewing page 4 out of 10 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following tools combines two programs, and also encrypts the resulting package in an attempt to foil antivirus programs?

Options:

A.

Trojan Man

B.

EliteWrap

C.

Tiny

D.

NetBus

Expert Solution
Questions # 32:

Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.

What is the name of this library?

Options:

A.

PCAP

B.

SysPCap

C.

WinPCap

D.

libpcap

Expert Solution
Questions # 33:

You have configured a virtualized Internet browser on your Windows XP professional computer. Using the virtualized Internet browser, you can protect your operating system from which of the following?

Options:

A.

Brute force attack

B.

Mail bombing

C.

Distributed denial of service (DDOS) attack

D.

Malware installation from unknown Web sites

Expert Solution
Questions # 34:

Which of the following functions can be used as a countermeasure to a Shell Injection attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

escapeshellarg()

B.

mysql_real_escape_string()

C.

regenerateid()

D.

escapeshellcmd()

Expert Solution
Questions # 35:

Buffer overflows are one of the major errors used for exploitation on the Internet today. A buffer overflow occurs when a particular operation/function writes more data into a variable than the variable was designed to hold.

Which of the following are the two popular types of buffer overflows?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Dynamic buffer overflows

B.

Stack based buffer overflow

C.

Heap based buffer overflow

D.

Static buffer overflows

Expert Solution
Questions # 36:

Which of the following are based on malicious code?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Denial-of-Service (DoS)

B.

Biometrics

C.

Trojan horse

D.

Worm

Expert Solution
Questions # 37:

You work as a System Engineer for Cyber World Inc. Your company has a single Active Directory domain. All servers in the domain run Windows Server 2008. The Microsoft Hyper-V server role has been installed on one of the servers, namely uC1. uC1 hosts twelve virtual machines. You have been given the task to configure the Shutdown option for uC1, so that each virtual machine shuts down before the main Hyper-V server shuts down. Which of the following actions will you perform to accomplish the task?

Options:

A.

Enable the Shut Down the Guest Operating System option in the Automatic Stop Action Properties on each virtual machine.

B.

Manually shut down each of the guest operating systems before the server shuts down.

C.

Create a batch file to shut down the guest operating system before the server shuts down.

D.

Create a logon script to shut down the guest operating system before the server shuts down.

Expert Solution
Questions # 38:

Which of the following malicious software travels across computer networks without the assistance of a user?

Options:

A.

Worm

B.

Virus

C.

Hoax

D.

Trojan horses

Expert Solution
Questions # 39:

Which of the following statements about Denial-of-Service (DoS) attack are true?

Each correct answer represents a complete solution. Choose three.

Options:

A.

It disrupts services to a specific computer.

B.

It changes the configuration of the TCP/IP protocol.

C.

It saturates network resources.

D.

It disrupts connections between two computers, preventing communications between services.

Expert Solution
Questions # 40:

Fill in the blank with the appropriate word.

StackGuard (as used by Immunix), ssp/ProPolice (as used by OpenBSD), and Microsoft's /GS option use ______ defense against buffer overflow attacks.

Options:

Expert Solution
Viewing page 4 out of 10 pages
Viewing questions 31-40 out of questions