[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GCIH Dumps with VCE and PDF 151-160

CollectDumps 2017 Sep GIAC Official New Released GCIH
100% Free Download! 100% Pass Guaranteed!

GIAC Certified Incident Handler

Question No: 151 CORRECT TEXT – (Topic 2)

Fill in the blank with the appropriate name of the attack.

takes best advantage of an existing authenticated connection

Answer: session hijacking

Question No: 152 – (Topic 2)

Which of the following reads and writes data across network connections by using the TCP/IP protocol?

  1. Fpipe


  3. Netcat

  4. 2Mosaic

Answer: C

Question No: 153 – (Topic 2)

Firekiller 2000 is an example of a .

  1. Security software disabler Trojan

  2. DoS attack Trojan

  3. Data sending Trojan

  4. Remote access Trojan

Answer: A

Question No: 154 – (Topic 2)

You want to integrate the Nikto tool with nessus vulnerability scanner. Which of the following steps will you take to accomplish the task?

Each correct answer represents a complete solution. Choose two.

  1. Place nikto.pl file in the /etc/nessus directory.

  2. Place nikto.pl file in the /var/www directory.

  3. Place the directory containing nikto.pl in root#39;s PATH environment variable.

  4. Restart nessusd service.

Answer: C,D

Question No: 155 – (Topic 2)

As a professional hacker, you want to crack the security of secureserver.com. For this, in the information gathering step, you performed scanning with the help of nmap utility to retrieve as many different protocols as possible being used by the secureserver.com so that you could get the accurate knowledge about what services were being used by the secure server.com. Which of the following nmap switches have you used to accomplish the task?

  1. nmap -vO

  2. nmap -sS

  3. nmap -sT

  4. nmap -sO

Answer: D

Question No: 156 – (Topic 2)

Which of the following programming languages are NOT vulnerable to buffer overflow attacks?

Each correct answer represents a complete solution. Choose two.

  1. C

  2. Java

  3. C

  4. Perl

Answer: B,D

Question No: 157 – (Topic 2)

Adam works as a Security Administrator for the Umbrella Inc. A project has been assigned to him to strengthen the security policies of the company, including its password policies. However, due to some old applications, Adam is only able to enforce a password group policy in Active Directory with a minimum of 10 characters. He informed the employees of the company, that the new password policy requires that everyone must have complex passwords with at least 14 characters. Adam wants to ensure that everyone is using complex passwords that meet the new security policy requirements. He logged on to one of the network#39;s domain controllers and runs the following command:

Collectdumps 2017 PDF and VCE

Which of the following actions will this command take?

  1. Dumps the SAM password hashes to pwd.txt

  2. Dumps the SAM password file to pwd.txt

  3. Dumps the Active Directory password hashes to pwd.txt

  4. The password history file is transferred to pwd.txt

Answer: A

Question No: 158 – (Topic 2)

Which of the following is executed when a predetermined event occurs?

  1. Trojan horse

  2. Logic bomb

  3. MAC

  4. Worm

Answer: B

Question No: 159 – (Topic 2)

Your friend plans to install a Trojan on your computer. He knows that if he gives you a new version of chess.exe, you will definitely install the game on your computer. He picks up a Trojan and joins it with chess.exe. Which of the following tools are required in such a scenario?

Each correct answer represents a part of the solution. Choose three.

  1. NetBus

  2. Absinthe

  3. Yet Another Binder

  4. Chess.exe

Answer: A,C,D

Question No: 160 – (Topic 2)

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

  1. Nmap

  2. Ethereal

  3. Ettercap

  4. Netcraft

Answer: D

100% Free Download!
Download Free Demo:GCIH Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GCIH Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE