Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the GIAC Security Administration GCIH Questions and answers with ValidTests

Exam GCIH All Questions
Exam GCIH Premium Access

View all detail and faqs for the GCIH exam

Viewing page 6 out of 10 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which of the following tools is described in the statement given below?

"It has a database containing signatures to be able to detect hundreds of vulnerabilities in UNIX, Windows, and commonly used web CGI scripts. Moreover, the database detects DdoS zombies and Trojans as well."

Options:

A.

SARA

B.

Nessus

C.

Anti-x

D.

Nmap

Expert Solution
Questions # 52:

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following would be the most help against Denial of Service (DOS) attacks?

Options:

A.

Packet filtering firewall

B.

Network surveys.

C.

Honey pot

D.

Stateful Packet Inspection (SPI) firewall

Expert Solution
Questions # 53:

Which of the following attacks allows an attacker to retrieve crucial information from a Web server's database?

Options:

A.

Database retrieval attack

B.

PHP injection attack

C.

SQL injection attack

D.

Server data attack

Expert Solution
Questions # 54:

Which of the following statements about buffer overflow are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is a situation that occurs when a storage device runs out of space.

B.

It is a situation that occurs when an application receives more data than it is configured to accept.

C.

It can improve application performance.

D.

It can terminate an application.

Expert Solution
Questions # 55:

John works as a Network Administrator for We-are-secure Inc. He finds that TCP port 7597 of the Weare- secure server is open. He suspects that it may be open due to a Trojan installed on the server. He presents a report to the company describing the symptoms of the Trojan. A summary of the report is given below:

Once this Trojan has been installed on the computer, it searches Notpad.exe, renames it Note.com, and then copies itself to the computer as Notepad.exe. Each time Notepad.exe is executed, the Trojan executes and calls the original Notepad to avoid being noticed.

Which of the following Trojans has the symptoms as the one described above?

Options:

A.

NetBus

B.

Qaz

C.

eBlaster

D.

SubSeven

Expert Solution
Questions # 56:

Adam works as an Incident Handler for Umbrella Inc. He is informed by the senior authorities that the server of the marketing department has been affected by a malicious hacking attack. Supervisors are also claiming that some sensitive data are also stolen.

Adam immediately arrived to the server room of the marketing department and identified the event as an incident. He isolated the infected network from the remaining part of the network and started preparing to image the entire system. He captures volatile data, such as running process, ram, and network connections.

Which of the following steps of the incident handling process is being performed by Adam?

Options:

A.

Recovery

B.

Eradication

C.

Identification

D.

Containment

Expert Solution
Questions # 57:

Which of the following protocols is a maintenance protocol and is normally considered a part of the IP layer, but has also been used to conduct denial-of-service attacks?

Options:

A.

ICMP

B.

L2TP

C.

TCP

D.

NNTP

Expert Solution
Questions # 58:

Which of the following tasks can be performed by using netcat utility?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Checking file integrity

B.

Creating a Backdoor

C.

Firewall testing

D.

Port scanning and service identification

Expert Solution
Questions # 59:

Adam works as a Network administrator for Umbrella Inc. He noticed that an ICMP ECHO requests is coming from some suspected outside sources. Adam suspects that some malicious hacker is trying to perform ping sweep attack on the network of the company. To stop this malicious activity, Adam blocks the ICMP ECHO request from any outside sources.

What will be the effect of the action taken by Adam?

Options:

A.

Network turns completely immune from the ping sweep attacks.

B.

Network is still vulnerable to ping sweep attack.

C.

Network is protected from the ping sweep attack until the next reboot of the server.

D.

Network is now vulnerable to Ping of death attack.

Expert Solution
Questions # 60:

Which of the following is the difference between SSL and S-HTTP?

Options:

A.

SSL operates at the application layer and S-HTTP operates at the network layer.

B.

SSL operates at the application layer and S-HTTP operates at the transport layer.

C.

SSL operates at the network layer and S-HTTP operates at the application layer.

D.

SSL operates at the transport layer and S-HTTP operates at the application layer.

Expert Solution
Viewing page 6 out of 10 pages
Viewing questions 51-60 out of questions