Master the GCIH GIAC Certified Incident Handler content and be ready for exam day success quickly with this Passleader GCIH exam answers. We guarantee it!We make it a reality and give you real GCIH questions in our GIAC GCIH braindumps.Latest 100% VALID GIAC GCIH Exam Questions Dumps at below page. You can use our GIAC GCIH braindumps and pass your exam.
Online GIAC GCIH free dumps demo Below:
NEW QUESTION 1
You discover that all available network bandwidth is being used by some unknown service. You discover that UDP packets are being used to connect the echo service on one machine to the chargen service on another machine. What kind of attack is this?
Answer: B
NEW QUESTION 2
Which of the following rootkits adds additional code or replaces portions of an operating system, including both the kernel and associated device drivers?
Answer: C
NEW QUESTION 3
You work as a professional Ethical Hacker. You are assigned a project to test the security of www.weare-secure.com. You somehow enter in we-are-secure Inc. main server, which is Windows based.
While you are installing the NetCat tool as a backdoor in the we-are-secure server, you see the file credit.dat having the list of credit card numbers of the company's employees. You want to transfer the credit.dat file in your local computer so that you can sell that information on the internet in the good price. However, you do not want to send the contents of this file in the clear text format since you do not want that the Network Administrator of the we-are-secure Inc. can get any clue of the hacking attempt. Hence, you decide to send the content of the credit.dat file in the encrypted format.
What steps should you take to accomplish the task?
Answer: C
NEW QUESTION 4
You enter the netstat -an command in the command prompt and you receive intimation that port number 7777 is open on your computer. Which of the following Trojans may be installed on your computer?
Answer: D
NEW QUESTION 5
An Active Attack is a type of steganography attack in which the attacker changes the carrier during the communication process. Which of the following techniques is used for smoothing the transition and controlling contrast on the hard edges, where there is significant color transition?
Answer: D
NEW QUESTION 6
You run the following bash script in Linux:
for i in 'cat hostlist.txt' ;do
nc -q 2 -v $i 80 < request.txt done
Where, hostlist.txt file contains the list of IP addresses and request.txt is the output file. Which of the following tasks do you want to perform by running this script?
Answer: B
NEW QUESTION 7
Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.
Answer: A
NEW QUESTION 8
You run the following PHP script:
<?php $name = mysql_real_escape_string($_POST["name"]);
$password = mysql_real_escape_string($_POST["password"]); ?>
What is the use of the mysql_real_escape_string() function in the above script.
Each correct answer represents a complete solution. Choose all that apply.
Answer: BD
NEW QUESTION 9
Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?
Each correct answer represents a part of the solution. Choose all that apply.
Answer: AD
NEW QUESTION 10
Which of the following types of attacks slows down or stops a server by overloading it with requests?
Answer: A
NEW QUESTION 11
Which of the following is a network worm that exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system?
Answer: C
NEW QUESTION 12
Adam, a malicious hacker is sniffing the network to inject ARP packets. He injects broadcast frames onto the wire to conduct Man-in-The-Middle attack.
Which of the following is the destination MAC address of a broadcast frame?
Answer: C
NEW QUESTION 13
You are responsible for security at a company that uses a lot of Web applications. You are most concerned about flaws in those applications allowing some attacker to get into your network. What method would be best for finding such flaws?
Answer: D
NEW QUESTION 14
Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?
Answer: C
NEW QUESTION 15
Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover.
Which of the following Steganography methods is Victor using to accomplish the task?
Answer: A
NEW QUESTION 16
John works as a Network Administrator for We-are-secure Inc. He finds that TCP port 7597 of the Weare- secure server is open. He suspects that it may be open due to a Trojan installed on the server. He presents a report to the company describing the symptoms of the Trojan. A summary of the report is given below:
Once this Trojan has been installed on the computer, it searches Notpad.exe, renames it Note.com, and then copies itself to the computer as Notepad.exe. Each time Notepad.exe is executed, the Trojan executes and calls the original Notepad to avoid being noticed.
Which of the following Trojans has the symptoms as the one described above?
Answer: B
NEW QUESTION 17
Which of the following practices come in the category of denial of service attack?
Each correct answer represents a complete solution. Choose three.
Answer: BCD
NEW QUESTION 18
Which of the following tools uses common UNIX/Linux tools like the strings and grep commands to search core system programs for signatures of the rootkits?
Answer: C
NEW QUESTION 19
Which of the following is a technique for creating Internet maps?
Each correct answer represents a complete solution. Choose two.
Answer: AB
NEW QUESTION 20
......
P.S. Dumpscollection.com now are offering 100% pass ensure GCIH dumps! All GCIH exam questions have been updated with correct answers: https://www.dumpscollection.net/dumps/GCIH/ (328 New Questions)