[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GCIH Dumps with VCE and PDF 111-120

CollectDumps 2017 Sep GIAC Official New Released GCIH
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GCIH.html

GIAC Certified Incident Handler

Question No: 111 – (Topic 2)

Which of the following rootkits is able to load the original operating system as a virtual machine, thereby enabling it to intercept all hardware calls made by the original operating system?

  1. Kernel level rootkit

  2. Boot loader rootkit

  3. Hypervisor rootkit

  4. Library rootkit

Answer: C

Question No: 112 – (Topic 2)

Which of the following can be used as a Trojan vector to infect an information system? Each correct answer represents a complete solution. Choose all that apply.

  1. NetBIOS remote installation

  2. Any fake executable

  3. Spywares and adware

  4. ActiveX controls, VBScript, and Java scripts

Answer: A,B,C,D

Question No: 113 – (Topic 2)

In which of the following malicious hacking steps does email tracking come under?

  1. Reconnaissance

  2. Gaining access

  3. Maintaining Access

  4. Scanning

Answer: A

Question No: 114 – (Topic 2)

In which of the following steps of the incident handling processes does the Incident Handler make sure that all business processes and functions are back to normal and then also wants to monitor the system or processes to ensure that the system is not compromised again?

  1. Eradication

  2. Lesson Learned

  3. Recovery

  4. Containment

Answer: C

Question No: 115 – (Topic 2)

Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover.

Which of the following Steganography methods is Victor using to accomplish the task?

  1. The distortion technique

  2. The spread spectrum technique

  3. The substitution technique

  4. The cover generation technique

Answer: A

Question No: 116 – (Topic 2)

Which of the following is the process of comparing cryptographic hash functions of system

executables and configuration files?

  1. Shoulder surfing

  2. File integrity auditing

  3. Reconnaissance

  4. Spoofing

Answer: B

Question No: 117 – (Topic 2)

Which of the following types of malware can an antivirus application disable and destroy? Each correct answer represents a complete solution. Choose all that apply.

  1. Rootkit

  2. Trojan

  3. Crimeware

  4. Worm

  5. Adware

  6. Virus

Answer: A,B,D,F

Question No: 118 – (Topic 2)

Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes. On the basis of above information, which of the following types of attack is Adam attempting to perform?

  1. Fraggle attack

  2. Ping of death attack

  3. SYN Flood attack

  4. Land attack

Answer: B

Question No: 119 – (Topic 2)

Which of the following tools can be used as penetration tools in the Information system auditing process?

Each correct answer represents a complete solution. Choose two.

  1. Nmap

  2. Snort

  3. SARA

  4. Nessus

Answer: C,D

Question No: 120 – (Topic 2)

Which of the following US Acts emphasized a quot;risk-based policy for cost-effective securityquot; and makes mandatory for agency program officials, chief information officers, and inspectors general (IGs) to conduct annual reviews of the agency#39;s information security program and report the results to Office of Management and Budget?

  1. The Electronic Communications Privacy Act of 1986 (ECPA)

  2. The Fair Credit Reporting Act (FCRA)

  3. The Equal Credit Opportunity Act (ECOA)

  4. Federal Information Security Management Act of 2002 (FISMA)

Answer: D

100% Free Download!
Download Free Demo:GCIH Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GCIH Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE