09 December, 2024
The Most Up-to-date Guide To GCIH Training Materials
Your success in GIAC GCIH is our sole target and we develop all our GCIH braindumps in a way that facilitates the attainment of this target. Not only is our GCIH study material the best you can find, it is also the most detailed and the most updated. GCIH Practice Exams for GIAC GCIH are written to the highest standards of technical accuracy.
Question 1
A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as network saturation attack or bandwidth consumption attack. Attackers perform DoS attacks by sending a large number of protocol packets to a network. The problems caused by a DoS attack are as follows:
l Saturation of network resources
l Disruption of connections between two computers, thereby preventing communications between services
l Disruption of services to a specific computer
l Failure to access a Web site
l Increase in the amount of spam
Which of the following can be used as countermeasures against DoS attacks?
Each correct answer represents a complete solution. Choose all that apply.
l Saturation of network resources
l Disruption of connections between two computers, thereby preventing communications between services
l Disruption of services to a specific computer
l Failure to access a Web site
l Increase in the amount of spam
Which of the following can be used as countermeasures against DoS attacks?
Each correct answer represents a complete solution. Choose all that apply.
Question 2
Which of the following incident response team members ensures that the policies of the organization are enforced during the incident response?
Question 3
108 ms 14 0.so-4-1-0.TL1.ATL5.ALTER.NET (152.63.10.129) 37.894 ms 33.244 ms
Solution:
Does this meet the goal?
Solution:
Does this meet the goal?
Question 4
Which of the following statements about threats are true?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
Question 5
Which of the following statements are true about firewalking?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
Question 6
John works as an Ethical Hacker for Exambible Inc. He wants to find out the ports that are open in Exambible's server using a port scanner. However, he does not want to establish a full TCP connection.
Which of the following scanning techniques will he use to accomplish this task?
Which of the following scanning techniques will he use to accomplish this task?
Question 7
Which of the following tools is an automated tool that is used to implement SQL injections and to retrieve data from Web server databases?
Question 8
Which of the following protocol loggers is used to detect ping sweep?
Question 9
Your friend plans to install a Trojan on your computer. He knows that if he gives you a new version of chess.exe, you will definitely install the game on your computer. He picks up a Trojan and joins it with chess.exe. Which of the following tools are required in such a scenario?
Each correct answer represents a part of the solution. Choose three.
Each correct answer represents a part of the solution. Choose three.
Question 10
Which of the following rootkits patches, hooks, or replaces system calls with versions that hide information about the attacker?
Question 11
Which of the following is a process of searching unauthorized modems?
Question 12
Maria works as a professional Ethical Hacker. She recently got a project to test the security of www.we-are-secure.com. Arrange the three pre -test phases of the attack to test the security of weare-secure.
Solution:
Does this meet the goal?
Solution:
Does this meet the goal?
Question 13
Which of the following tools combines two programs, and also encrypts the resulting package in an attempt to foil antivirus programs?
Question 14
Who are the primary victims of smurf attacks on the contemporary Internet system?
Question 15
Which of the following characters will you use to check whether an application is vulnerable to an SQL injection attack?
Question 16
Your company has been hired to provide consultancy, development, and integration services for a company named Brainbridge International. You have prepared a case study to plan the upgrade for the company. Based on the case study, which of the following steps will you suggest for configuring WebStore1?
Each correct answer represents a part of the solution. Choose two.
Each correct answer represents a part of the solution. Choose two.