[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GCIH Dumps with VCE and PDF 101-110

CollectDumps 2017 Sep GIAC Official New Released GCIH
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GCIH.html

GIAC Certified Incident Handler

Question No: 101 – (Topic 2)

You work as a System Administrator in SunSoft Inc. You are running a virtual machine on Windows Server 2003. The virtual machine is protected by DPM. Now, you want to move the virtual machine to another host. Which of the following steps can you use to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Remove the original virtual machine from the old server and stop the protection for the original virtual machine.

  2. Run consistency check.

  3. Add the copied virtual machine to a protection group.

  4. Copy the virtual machine to the new server.

    Answer: A,C,D

    Question No: 102 – (Topic 2)

    Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography.

    Victor performs the following techniques to accomplish the task:

    1. Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.

    2. Reducing noise by adjusting color and averaging pixel value.

    3. Sharpening, Rotating, Resampling, and Softening the image. Which of the following Steganography attacks is Victor using?

      1. Stegdetect Attack

      2. Chosen-Stego Attack

      3. Steg-Only Attack

      4. Active Attacks

Answer: D

Question No: 103 – (Topic 2)

Which of the following penetration testing phases involves reconnaissance or data gathering?

  1. Attack phase

  2. Pre-attack phase

  3. Post-attack phase

  4. Out-attack phase

Answer: B

Question No: 104 – (Topic 2)

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company.

Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

  1. Linguistic steganography

  2. Perceptual masking

  3. Technical steganography

  4. Text Semagrams

Answer: A,D

Question No: 105 – (Topic 2)

Adam, a novice web user, is very conscious about the security. He wants to visit the Web site that is known to have malicious applets and code. Adam always makes use of a basic Web Browser to perform such testing.

Which of the following web browsers can adequately fill this purpose?

  1. Mozilla Firefox

  2. Internet explorer

  3. Lynx

  4. Safari

Answer: C

Question No: 106 – (Topic 2)

Which of the following services CANNOT be performed by the nmap utility? Each correct answer represents a complete solution. Choose all that apply.

  1. Passive OS fingerprinting

  2. Sniffing

  3. Active OS fingerprinting

  4. Port scanning

Answer: A,B

Question No: 107 – (Topic 2)

In which of the following attacks does an attacker spoof the source address in IP packets that are sent to the victim?

  1. Dos

  2. DDoS

  3. Backscatter

  4. SQL injection

Answer: C

Question No: 108 – (Topic 2)

Which of the following actions is performed by the netcat command given below?

nc 55555 lt; /etc/passwd

  1. It changes the /etc/passwd file when connected to the UDP port 55555.

  2. It resets the /etc/passwd file to the UDP port 55555.

  3. It fills the incoming connections to /etc/passwd file.

  4. It grabs the /etc/passwd file when connected to UDP port 55555.

Answer: D

Question No: 109 – (Topic 2)

Which of the following statements about Ping of Death attack is true?

  1. In this type of attack, a hacker sends more traffic to a network address than the buffer can handle.

  2. This type of attack uses common words in either upper or lower case to find a password.

  3. In this type of attack, a hacker maliciously cuts a network cable.

  4. In this type of attack, a hacker sends ICMP packets greater than 65,536 bytes to crash a system.

Answer: D

Question No: 110 – (Topic 2)

Which of the following refers to applications or files that are not classified as viruses or Trojan horse programs, but can still negatively affect the performance of the computers on your network and introduce significant security risks to your organization?

  1. Hardware

  2. Grayware

  3. Firmware

  4. Melissa

Answer: B

100% Free Download!
Download Free Demo:GCIH Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GCIH Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE