[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GCIH Dumps with VCE and PDF 121-130

CollectDumps 2017 Sep GIAC Official New Released GCIH
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GCIH.html

GIAC Certified Incident Handler

Question No: 121 – (Topic 2)

Which of the following can be used as a countermeasure against the SQL injection attack? Each correct answer represents a complete solution. Choose two.

  1. mysql_real_escape_string()

  2. session_regenerate_id()

  3. mysql_escape_string()

  4. Prepared statement

Answer: A,D

Question No: 122 – (Topic 2)

Mark works as a Network Administrator for Perfect Inc. The company has both wired and wireless networks. An attacker attempts to keep legitimate users from accessing services that they require. Mark uses IDS/IPS sensors on the wired network to mitigate the attack. Which of the following attacks best describes the attacker#39;s intentions?

  1. Internal attack

  2. Reconnaissance attack

  3. Land attack

  4. DoS attack

Answer: D

Question No: 123 – (Topic 2)

Which of the following are countermeasures to prevent unauthorized database access attacks?

Each correct answer represents a complete solution. Choose all that apply.

  1. Session encryption

  2. Removing all stored procedures

  3. Applying strong firewall rules

  4. Input sanitization

Answer: A,B,C,D

Question No: 124 – (Topic 2)

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following measures would be most helpful in defending against a Denial-of-

Service (DoS) attack?

  1. Implement network based antivirus.

  2. Place a honey pot in the DMZ.

  3. Shorten the timeout for connection attempts.

  4. Implement a strong password policy.

Answer: C

Question No: 125 – (Topic 2)

What is the purpose of configuring a password protected screen saver on a computer?

  1. For preventing unauthorized access to a system.

  2. For preventing a system from a Denial of Service (DoS) attack.

  3. For preventing a system from a social engineering attack.

  4. For preventing a system from a back door attack.

Answer: A

Question No: 126 – (Topic 2)

You are hired as a Database Administrator for Jennifer Shopping Cart Inc. You monitor the server health through the System Monitor and found that there is a sudden increase in the number of logins.

Which of the following types of attack has occurred?

  1. Injection

  2. Virus

  3. Worm

  4. Denial-of-service

Answer: D

Question No: 127 – (Topic 2)

Which of the following are the automated tools that are used to perform penetration testing?

Each correct answer represents a complete solution. Choose two.

  1. Pwdump

  2. Nessus

  3. EtherApe

  4. GFI LANguard

Answer: B,D

Question No: 128 – (Topic 2)

Which of the following statements about reconnaissance is true?

  1. It describes an attempt to transfer DNS zone data.

  2. It is a computer that is used to attract potential intruders or attackers.

  3. It is any program that allows a hacker to connect to a computer without going through the normal authentication process.

  4. It is also known as half-open scanning.

Answer: A

Question No: 129 – (Topic 2)

Which of the following malicious code can have more than one type of trigger, multiple task capabilities, and can replicate itself in more than one manner?

  1. Macro virus

  2. Blended threat

  3. Trojan

  4. Boot sector virus

Answer: B

Question No: 130 – (Topic 2)

Which of the following tools is used to attack the Digital Watermarking?

  1. Active Attacks

  2. 2Mosaic

  3. Steg-Only Attack

  4. Gifshuffle

Answer: B

100% Free Download!
Download Free Demo:GCIH Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GCIH Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE