Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the GIAC Security Administration GCIH Questions and answers with ValidTests

Exam GCIH All Questions
Exam GCIH Premium Access

View all detail and faqs for the GCIH exam

Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions
Questions # 81:

In which of the following malicious hacking steps does email tracking come under?

Options:

A.

Reconnaissance

B.

Gaining access

C.

Maintaining Access

D.

Scanning

Expert Solution
Questions # 82:

Which of the following techniques is used when a system performs the penetration testing with the objective of accessing unauthorized information residing inside a computer?

Options:

A.

Van Eck Phreaking

B.

Phreaking

C.

Biometrician

D.

Port scanning

Expert Solution
Questions # 83:

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

Options:

A.

Stegdetect Attack

B.

Chosen-Stego Attack

C.

Steg-Only Attack

D.

Active Attacks

Expert Solution
Questions # 84:

In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entire zone file for a domain from a DNS server. The information provided by the DNS zone can help an attacker gather user names, passwords, and other valuable information. To attempt a zone transfer, an attacker must be connected to a DNS server that is the authoritative server for that zone. Besides this, an attacker can launch a Denial of Service attack against the zone's DNS servers by flooding them with a lot of requests. Which of the following tools can an attacker use to perform a DNS zone transfer?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Host

B.

Dig

C.

DSniff

D.

NSLookup

Expert Solution
Questions # 85:

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

Options:

A.

Nmap

B.

Ethereal

C.

Ettercap

D.

Netcraft

Expert Solution
Questions # 86:

Which of the following types of malware can an antivirus application disable and destroy?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Rootkit

B.

Trojan

C.

Crimeware

D.

Worm

E.

Adware

F.

Virus

Expert Solution
Questions # 87:

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Linguistic steganography

B.

Perceptual masking

C.

Technical steganography

D.

Text Semagrams

Expert Solution
Questions # 88:

Adam is a novice Web user. He chooses a 22 letters long word from the dictionary as his password.

How long will it take to crack the password by an attacker?

Options:

A.

22 hours

B.

23 days

C.

200 years

D.

5 minutes

Expert Solution
Questions # 89:

Mark works as a Network Administrator for NetTech Inc. The network has 150 Windows 2000 Professional client computers and four Windows 2000 servers. All the client computers are able to connect to the Internet. Mark is concerned about malware infecting the client computers through the Internet. What will Mark do to protect the client computers from malware?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Educate users of the client computers to avoid malware.

B.

Educate users of the client computers about the problems arising due to malware.

C.

Prevent users of the client computers from executing any programs.

D.

Assign Read-Only permission to the users for accessing the hard disk drives of the client computers.

Expert Solution
Questions # 90:

Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?

Options:

A.

Kernel keylogger

B.

Software keylogger

C.

Hardware keylogger

D.

OS keylogger

Expert Solution
Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions