Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the GIAC Security Administration GCIH Questions and answers with ValidTests

Exam GCIH All Questions
Exam GCIH Premium Access

View all detail and faqs for the GCIH exam

Viewing page 5 out of 10 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which of the following statements are true about a keylogger?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It records all keystrokes on the victim's computer in a predefined log file.

B.

It can be remotely installed on a computer system.

C.

It is a software tool used to trace all or specific activities of a user on a computer.

D.

It uses hidden code to destroy or scramble data on the hard disk.

Expert Solution
Questions # 42:

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. On the We-are-secure login page, he enters ='or''=' as a username and successfully logs in to the user page of the Web site.

The we-are-secure login page is vulnerable to a __________.

Options:

A.

Dictionary attack

B.

SQL injection attack

C.

Replay attack

D.

Land attack

Expert Solution
Questions # 43:

Which of the following hacking tools provides shell access over ICMP?

Options:

A.

John the Ripper

B.

Nmap

C.

Nessus

D.

Loki

Expert Solution
Questions # 44:

US Garments wants all encrypted data communication between corporate office and remote location.

They want to achieve following results:

l Authentication of users

l Anti-replay

l Anti-spoofing

l IP packet encryption

They implemented IPSec using Authentication Headers (AHs). Which results does this solution provide?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Anti-replay

B.

IP packet encryption

C.

Authentication of users

D.

Anti-spoofing

Expert Solution
Questions # 45:

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?

Options:

A.

Containment

B.

Preparation

C.

Recovery

D.

Identification

Expert Solution
Questions # 46:

Which of the following types of skills are required in the members of an incident handling team?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Organizational skills

B.

Diplomatic skills

C.

Methodical skills

D.

Technical skills

Expert Solution
Questions # 47:

Which of the following virus is a script that attaches itself to a file or template?

Options:

A.

Boot sector

B.

Trojan horse

C.

Macro virus

D.

E-mail virus

Expert Solution
Questions # 48:

You enter the following URL on your Web browser:

http://www.we-are-secure.com/scripts/..%co%af../..%co%

af../windows/system32/cmd.exe?/c+dir+c:\

What kind of attack are you performing?

Options:

A.

Directory traversal

B.

Replay

C.

Session hijacking

D.

URL obfuscating

Expert Solution
Questions # 49:

A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as network saturation attack or bandwidth consumption attack. Attackers perform DoS attacks by sending a large number of protocol packets to a network. The problems caused by a DoS attack are as follows:

l Saturation of network resources

l Disruption of connections between two computers, thereby preventing communications between services

l Disruption of services to a specific computer

l Failure to access a Web site

l Increase in the amount of spam

Which of the following can be used as countermeasures against DoS attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Blocking undesired IP addresses

B.

Applying router filtering

C.

Disabling unneeded network services

D.

Permitting network access only to desired traffic

Expert Solution
Questions # 50:

Which of the following wireless network security solutions refers to an authentication process in which a user can connect wireless access points to a centralized server to ensure that all hosts are properly authenticated?

Options:

A.

Remote Authentication Dial-In User Service (RADIUS)

B.

IEEE 802.1x

C.

Wired Equivalent Privacy (WEP)

D.

Wi-Fi Protected Access 2 (WPA2)

Expert Solution
Viewing page 5 out of 10 pages
Viewing questions 41-50 out of questions