Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the GIAC Security Administration GCIH Questions and answers with ValidTests

Exam GCIH All Questions
Exam GCIH Premium Access

View all detail and faqs for the GCIH exam

Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions
Questions # 61:

Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to perform hacking. Which of the following steps is NOT included in the hacking process?

Options:

A.

Scanning

B.

Preparation

C.

gaining access

D.

Reconnaissance

Expert Solution
Questions # 62:

Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to test the network security of the company. He created a webpage to discuss the progress of the tests with employees who were interested in following the test. Visitors were allowed to click on a company's icon to mark the progress of the test. Adam successfully embeds a keylogger. He also added some statistics on the webpage. The firewall protects the network well and allows strict Internet access.

How was security compromised and how did the firewall respond?

Options:

A.

The attack was social engineering and the firewall did not detect it.

B.

Security was not compromised as the webpage was hosted internally.

C.

The attack was Cross Site Scripting and the firewall blocked it.

D.

Security was compromised as keylogger is invisible for firewall.

Expert Solution
Questions # 63:

Your company has been hired to provide consultancy, development, and integration services for a company named Brainbridge International. You have prepared a case study to plan the upgrade for the company. Based on the case study, which of the following steps will you suggest for configuring WebStore1?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Customize IIS 6.0 to display a legal warning page on the generation of the 404.2 and 404.3 errors.

B.

Move the WebStore1 server to the internal network.

C.

Configure IIS 6.0 on WebStore1 to scan the URL for known buffer overflow attacks.

D.

Move the computer account of WebStore1 to the Remote organizational unit (OU).

Expert Solution
Questions # 64:

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following steps of the pre-attack phase:

l Information gathering

l Determining network range

l Identifying active machines

l Finding open ports and applications

l OS fingerprinting

l Fingerprinting services

Now John wants to perform network mapping of the We-are-secure network. Which of the following tools can he use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Ettercap

B.

Traceroute

C.

Cheops

D.

NeoTrace

Expert Solution
Questions # 65:

You are the Security Consultant and have been hired to check security for a client's network. Your client has stated that he has many concerns but the most critical is the security of Web applications on their Web server. What should be your highest priority then in checking his network?

Options:

A.

Setting up IDS

B.

Port scanning

C.

Vulnerability scanning

D.

Setting up a honey pot

Expert Solution
Questions # 66:

Which of the following scanning tools is also a network analysis tool that sends packets with nontraditional IP stack parameters and allows the scanner to gather information from the response packets generated?

Options:

A.

Tcpview

B.

Nessus

C.

Legion

D.

HPing

Expert Solution
Questions # 67:

Which of the following are types of access control attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Spoofing

B.

Brute force attack

C.

Dictionary attack

D.

Mail bombing

Expert Solution
Questions # 68:

You work as a System Administrator for Happy World Inc. Your company has a server named uC1 that runs Windows Server 2008. The Windows Server virtualization role service is installed on the uC1 server which hosts one virtual machine that also runs Windows Server 2008. You are required to install a new application on the virtual machine. You need to ensure that in case of a failure of the application installation, you are able to quickly restore the virtual machine to its original state.

Which of the following actions will you perform to accomplish the task?

Options:

A.

Use the Virtualization Management Console to save the state of the virtual machine.

B.

Log on to the virtual host and create a new dynamically expanding virtual hard disk.

C.

Use the Virtualization Management Console to create a snapshot of the virtual machine.

D.

Use the Edit Virtual Hard Disk Wizard to copy the virtual hard disk of the virtual machine.

Expert Solution
Questions # 69:

Which of the following is used by attackers to obtain an authenticated connection on a network?

Options:

A.

Denial-of-Service (DoS) attack

B.

Replay attack

C.

Man-in-the-middle attack

D.

Back door

Expert Solution
Questions # 70:

Which of the following Trojans is used by attackers to modify the Web browser settings?

Options:

A.

Win32/FlyStudio

B.

Trojan.Lodear

C.

WMA/TrojanDownloader.GetCodec

D.

Win32/Pacex.Gen

Expert Solution
Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions