[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GCIH Dumps with VCE and PDF 21-30

CollectDumps 2017 Sep GIAC Official New Released GCIH
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GCIH.html

GIAC Certified Incident Handler

Question No: 21 – (Topic 1)

Adam works as an Incident Handler for Umbrella Inc. He has been sent to the California unit to train the members of the incident response team. As a demo project he asked members of the incident response team to perform the following actions:

Remove the network cable wires. Isolate the system on a separate VLAN

Use a firewall or access lists to prevent communication into or out of the system. Change DNS entries to direct traffic away from compromised system

Which of the following steps of the incident handling process includes the above actions?

  1. Identification

  2. Containment

  3. Eradication

  4. Recovery

Answer: B

Question No: 22 – (Topic 1)

Which of the following types of attacks is only intended to make a computer resource unavailable to its users?

  1. Denial of Service attack

  2. Replay attack

  3. Teardrop attack

  4. Land attack

Answer: A

Question No: 23 – (Topic 1)

Maria works as a professional Ethical Hacker. She is assigned a project to test the security of www.we-are-secure.com. She wants to test a DoS attack on the We-are-secure server. She finds that the firewall of the server is blocking the ICMP messages, but it is not checking the UDP packets. Therefore, she sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the We-are-secure server. Which of the following DoS attacks is Maria using to accomplish her task?

  1. Ping flood attack

  2. Fraggle DoS attack

  3. Teardrop attack

  4. Smurf DoS attack

Answer: B

Question No: 24 – (Topic 1)

Which of the following statements are true about tcp wrappers?

Each correct answer represents a complete solution. Choose all that apply.

  1. tcp wrapper provides access control, host address spoofing, client username lookups,

    etc.

  2. When a user uses a TCP wrapper, the inetd daemon runs the wrapper program tcpd instead of running the server program directly.

  3. tcp wrapper allows host or subnetwork IP addresses, names and/or ident query replies, to be used as tokens to filter for access control purposes.

  4. tcp wrapper protects a Linux server from IP address spoofing.

Answer: A,B,C

Question No: 25 – (Topic 1)

Which of the following characters will you use to check whether an application is vulnerable to an SQL injection attack?

  1. Dash (-)

  2. Double quote (quot;)

  3. Single quote (#39;)

  4. Semi colon (;)

Answer: C

Question No: 26 – (Topic 1)

Which of the following are the primary goals of the incident handling team? Each correct answer represents a complete solution. Choose all that apply.

  1. Freeze the scene.

  2. Repair any damage caused by an incident.

  3. Prevent any further damage.

  4. Inform higher authorities.

Answer: A,B,C

Question No: 27 – (Topic 1)

Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?

  1. Fraggle

  2. Ping flood

  3. Bonk

  4. Smurf

Answer: C

Question No: 28 – (Topic 1)

Buffer overflows are one of the major errors used for exploitation on the Internet today. A buffer overflow occurs when a particular operation/function writes more data into a variable than the variable was designed to hold.

Which of the following are the two popular types of buffer overflows? Each correct answer represents a complete solution. Choose two.

  1. Dynamic buffer overflows

  2. Stack based buffer overflow

  3. Heap based buffer overflow

  4. Static buffer overflows

Answer: B,C

Question No: 29 – (Topic 1)

Which of the following statements are true about netcat?

Each correct answer represents a complete solution. Choose all that apply.

  1. It provides special tunneling, such as UDP to TCP, with the possibility of specifying all network parameters.

  2. It can be used as a file transfer solution.

  3. It provides outbound and inbound connections for TCP and UDP ports.

  4. The nc -z command can be used to redirect stdin/stdout from a program.

Answer: A,B,C

Question No: 30 – (Topic 1)

Adam, a malicious hacker, wants to perform a reliable scan against a remote target. He is not concerned about being stealth at this point.

Which of the following type of scans would be most accurate and reliable?

  1. UDP sacn

  2. TCP Connect scan

  3. ACK scan

  4. Fin scan

Answer: B

100% Free Download!
Download Free Demo:GCIH Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GCIH Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE