[Newest Version] Free GCIH PDF and Exam Questions Download 100% Pass Exam

Attention please! Here is the shortcut to pass your Newest GCIH practice exam! Get yourself well prepared for the GIAC Information Security Newest GCIH vce GIAC Certified Incident Handler exam is really a hard job. But don’t worry! We We, provides the most update GCIH vce. With We latest GCIH pdf, you’ll pass the GIAC Information Security Mar 28,2022 Latest GCIH study guide GIAC Certified Incident Handler exam in an easy way

We Geekcert has our own expert team. They selected and published the latest GCIH preparation materials from Official Exam-Center.

The following are the GCIH free dumps. Go through and check the validity and accuracy of our GCIH dumps.GCIH free dumps are questions from the latest full GCIH dumps. Check GCIH free questions to get a better understanding of GCIH exams.

Question 1:

Adam has installed and configured his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Adam notices that when he uses his wireless connection, the speed is sometimes 16 Mbps and sometimes it is only 8 Mbps or less. Adam connects to the management utility wireless router and finds out that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router\’s logs and notices that the unfamiliar machine has the same MAC address as his laptop.

Which of the following attacks has been occurred on the wireless network of Adam?

A. NAT spoofing

B. DNS cache poisoning

C. MAC spoofing

D. ARP spoofing

Correct Answer: C

Question 2:

Which of the following statements are true about worms? Each correct answer represents a complete solution. Choose all that apply.

A. Worms cause harm to the network by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

B. Worms can exist inside files such as Word or Excel documents.

C. One feature of worms is keystroke logging.

D. Worms replicate themselves from one system to another without using a host file.

Correct Answer: ABD

Question 3:

Which of the following statements are true about a keylogger? Each correct answer represents a complete solution. Choose all that apply.

A. It records all keystrokes on the victim\’s computer in a predefined log file.

B. It can be remotely installed on a computer system.

C. It is a software tool used to trace all or specific activities of a user on a computer.

D. It uses hidden code to destroy or scramble data on the hard disk.

Correct Answer: ABC

Question 4:

You have configured a virtualized Internet browser on your Windows XP professional computer.

Using the virtualized Internet browser, you can protect your operating system from which of the following?

A. Brute force attack

B. Mail bombing

C. Distributed denial of service (DDOS) attack

D. Malware installation from unknown Web sites

Correct Answer: D

Question 5:

You see the career section of a company\’s Web site and analyze the job profile requirements. You conclude that the company wants professionals who have a sharp knowledge of Windows server 2003 and Windows active directory installation and placement. Which of the following steps are you using to perform hacking?

A. Scanning

B. Covering tracks

C. Reconnaissance

D. Gaining access

Correct Answer: C

Question 6:

You want to scan your network quickly to detect live hosts by using ICMP ECHO Requests. What type of scanning will you perform to accomplish the task?

A. Idle scan

B. TCP SYN scan

C. XMAS scan

D. Ping sweep scan

Correct Answer: D

Question 7:

Which of the following malicious software travels across computer networks without the assistance of a user?

A. Worm

B. Virus

C. Hoax

D. Trojan horses

Correct Answer: A

Question 8:

What is the major difference between a worm and a Trojan horse?

A. A worm spreads via e-mail, while a Trojan horse does not.

B. A worm is a form of malicious program, while a Trojan horse is a utility.

C. A worm is self replicating, while a Trojan horse is not.

D. A Trojan horse is a malicious program, while a worm is an anti-virus software.

Correct Answer: C

Question 9:

You have inserted a Trojan on your friend\’s computer and you want to put it in the startup so that whenever the computer reboots the Trojan will start to run on the startup. Which of the following try entries will you edit to accomplish the task?

A. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Startup

B. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Auto

C. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices

D. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Start

Correct Answer: C

Question 10:

Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking on the server of DataSoft Inc. to hone his hacking skills. The company has a Windows-based network. Jason successfully enters the target system remotely by using the advantage of vulnerability. He places a Trojan to maintain future access and then disconnects the remote session. The employees of the company complain to Mark, who works as a Professional Ethical Hacker for DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that some irrelevant log files and signs of Trojans are present on the computers. He suspects that a malicious hacker has accessed the network. Mark takes the help from Forensic Investigators and catches Jason.

Which of the following mistakes made by Jason helped the Forensic Investigators catch him?

A. Jason did not perform a vulnerability assessment.

B. Jason did not perform OS fingerprinting.

C. Jason did not perform foot printing.

D. Jason did not perform covering tracks.

E. Jason did not perform port scanning.

Correct Answer: D

Question 11:

Your company has been hired to provide consultancy, development, and integration services for a company named Brainbridge International. You have prepared a case study to plan the upgrade for the company. Based on the case study, which of the following steps will you suggest for configuring WebStore1?

Each correct answer represents a part of the solution. Choose two.

A. Customize IIS 6.0 to display a legal warning page on the generation of the 404.2 and 404.3 errors.

B. Move the WebStore1 server to the internal network.

C. Configure IIS 6.0 on WebStore1 to scan the URL for known buffer overflow attacks.

D. Move the computer account of WebStore1 to the Remote organizational unit (OU).

Correct Answer: AC

Question 12:

Which of the following tools can be used to detect the steganography?

A. Dskprobe

B. Blindside

C. ImageHide

D. Snow

Correct Answer: A

Question 13:

Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP

messages, but it is not checking the UDP

packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server.

Which of the following DoS attacks is Maria using to accomplish her task?

A. Ping flood attack

B. Fraggle DoS attack

C. Teardrop attack

D. Smurf DoS attack

Correct Answer: B

Question 14:

Which of the following is designed to protect the Internet resolvers (clients) from forged DNS data created by DNS cache poisoning?

A. Stub resolver


C. Split-horizon DNS

D. Domain Name System Extension (DNSSEC)

Correct Answer: D

Question 15:

Which of the following tools can be used for stress testing of a Web server? Each correct answer represents a complete solution. Choose two.

A. Internet bots

B. Scripts

C. Anti-virus software

D. Spyware

Correct Answer: AB

Leave a Reply

Your email address will not be published.