The Most Up-to-date Guide To GCIH Training Materials

Your success in GIAC GCIH is our sole target and we develop all our GCIH braindumps in a way that facilitates the attainment of this target. Not only is our GCIH study material the best you can find, it is also the most detailed and the most updated. GCIH Practice Exams for GIAC GCIH are written to the highest standards of technical accuracy.

Page: 1 / 27
Total 328 questions Full Exam Access
Question 1
A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as network saturation attack or bandwidth consumption attack. Attackers perform DoS attacks by sending a large number of protocol packets to a network. The problems caused by a DoS attack are as follows:
l Saturation of network resources
l Disruption of connections between two computers, thereby preventing communications between services
l Disruption of services to a specific computer
l Failure to access a Web site
l Increase in the amount of spam
Which of the following can be used as countermeasures against DoS attacks?
Each correct answer represents a complete solution. Choose all that apply.
My answer: -
Reference answer: ABCD
Reference analysis:

None

Question 2
Which of the following incident response team members ensures that the policies of the organization are enforced during the incident response?
My answer: -
Reference answer: C
Reference analysis:

None

Question 3
108 ms 14 0.so-4-1-0.TL1.ATL5.ALTER.NET (152.63.10.129) 37.894 ms 33.244 ms
Solution:


Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 4
Which of the following statements about threats are true?
Each correct answer represents a complete solution. Choose all that apply.
My answer: -
Reference answer: BCD
Reference analysis:

None

Question 5
Which of the following statements are true about firewalking?
Each correct answer represents a complete solution. Choose all that apply.
My answer: -
Reference answer: ABC
Reference analysis:

None

Question 6
John works as an Ethical Hacker for Exambible Inc. He wants to find out the ports that are open in Exambible's server using a port scanner. However, he does not want to establish a full TCP connection.
Which of the following scanning techniques will he use to accomplish this task?
My answer: -
Reference answer: C
Reference analysis:

None

Question 7
Which of the following tools is an automated tool that is used to implement SQL injections and to retrieve data from Web server databases?
My answer: -
Reference answer: B
Reference analysis:

None

Question 8
Which of the following protocol loggers is used to detect ping sweep?
My answer: -
Reference answer: D
Reference analysis:

None

Question 9
Your friend plans to install a Trojan on your computer. He knows that if he gives you a new version of chess.exe, you will definitely install the game on your computer. He picks up a Trojan and joins it with chess.exe. Which of the following tools are required in such a scenario?
Each correct answer represents a part of the solution. Choose three.
My answer: -
Reference answer: ACD
Reference analysis:

None

Question 10
Which of the following rootkits patches, hooks, or replaces system calls with versions that hide information about the attacker?
My answer: -
Reference answer: A
Reference analysis:

None

Question 11
Which of the following is a process of searching unauthorized modems?
My answer: -
Reference answer: B
Reference analysis:

None

Question 12
Maria works as a professional Ethical Hacker. She recently got a project to test the security of www.we-are-secure.com. Arrange the three pre -test phases of the attack to test the security of weare-secure.
GCIH dumps exhibit
Solution:
GCIH dumps exhibit

Does this meet the goal?
My answer: -
Reference answer: A
Reference analysis:

None

Question 13
Which of the following tools combines two programs, and also encrypts the resulting package in an attempt to foil antivirus programs?
My answer: -
Reference answer: A
Reference analysis:

None

Question 14
Who are the primary victims of smurf attacks on the contemporary Internet system?
My answer: -
Reference answer: A
Reference analysis:

None

Question 15
Which of the following characters will you use to check whether an application is vulnerable to an SQL injection attack?
My answer: -
Reference answer: C
Reference analysis:

None

Question 16
Your company has been hired to provide consultancy, development, and integration services for a company named Brainbridge International. You have prepared a case study to plan the upgrade for the company. Based on the case study, which of the following steps will you suggest for configuring WebStore1?
Each correct answer represents a part of the solution. Choose two.
My answer: -
Reference answer: AC
Reference analysis:

None

Page: 1 / 27
Total 328 questions Full Exam Access