[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GCIH Dumps with VCE and PDF 51-60

CollectDumps 2017 Sep GIAC Official New Released GCIH
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GCIH.html

GIAC Certified Incident Handler

Question No: 51 – (Topic 1)

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against .

  1. IIS buffer overflow

  2. NetBIOS NULL session

  3. SNMP enumeration

  4. DNS zone transfer

Answer: A

Question No: 52 – (Topic 1)

Which of the following is the best method of accurately identifying the services running on a victim host?

  1. Use of the manual method of telnet to each of the open ports.

  2. Use of a port scanner to scan each port to confirm the services running.

  3. Use of hit and trial method to guess the services and ports of the victim host.

  4. Use of a vulnerability scanner to try to probe each port to verify which service is running.

Answer: A

Question No: 53 – (Topic 1)

Which of the following types of attacks is mounted with the objective of causing a negative impact on the performance of a computer or network?

  1. Vulnerability attack

  2. Man-in-the-middle attack

  3. Denial-of-Service (DoS) attack

  4. Impersonation attack

Answer: C

Question No: 54 – (Topic 1)

Adam works as a sales manager for Umbrella Inc. He wants to download software from the Internet. As the software comes from a site in his untrusted zone, Adam wants to ensure that the downloaded software has not been Trojaned. Which of the following options would indicate the best course of action for Adam?

  1. Compare the file size of the software with the one given on the Website.

  2. Compare the version of the software with the one published on the distribution media.

  3. Compare the file#39;s virus signature with the one published on the distribution.

  4. Compare the file#39;s MD5 signature with the one published on the distribution media.

Answer: D

Question No: 55 – (Topic 1)

Which of the following are types of access control attacks?

Each correct answer represents a complete solution. Choose all that apply.

  1. Spoofing

  2. Brute force attack

  3. Dictionary attack

  4. Mail bombing

Answer: A,B,C

Question No: 56 – (Topic 1)

Adam works as a Security Analyst for Umbrella Inc. Company has a Windows-based network. All computers run on Windows XP. Manager of the Sales department complains Adam about the unusual behavior of his computer. He told Adam that some pornographic contents are suddenly appeared on his computer overnight. Adam suspects that some malicious software or Trojans have been installed on the computer. He runs some diagnostics programs and Port scanners and found that the Port 12345, 12346, and 20034 are open. Adam also noticed some tampering with the Windows registry, which causes one application to run every time when Windows start.

Which of the following is the most likely reason behind this issue?

  1. Cheops-ng is installed on the computer.

  2. Elsave is installed on the computer.

  3. NetBus is installed on the computer.

  4. NetStumbler is installed on the computer.

Answer: C

Question No: 57 – (Topic 1)

Which of the following statements about buffer overflow is true?

  1. It manages security credentials and public keys for message encryption.

  2. It is a collection of files used by Microsoft for software updates released between major service pack releases.

  3. It is a condition in which an application receives more data than it is configured to accept.

  4. It is a false warning about a virus.

Answer: C

Question No: 58 – (Topic 1)

You check performance logs and note that there has been a recent dramatic increase in the amount of broadcast traffic. What is this most likely to be an indicator of?

  1. Virus

  2. Syn flood

  3. Misconfigured router

  4. DoS attack

Answer: D

Question No: 59 – (Topic 1)

John, a part-time hacker, has accessed in unauthorized way to the www.yourbank.com banking Website and stolen the bank account information of its users and their credit card numbers by using the SQL injection attack. Now, John wants to sell this information to malicious person Mark and make a deal to get a good amount of money. Since, he does not want to send the hacked information in the clear text format to Mark; he decides to send information in hidden text. For this, he takes a steganography tool and hides the information in ASCII text by appending whitespace to the end of lines and encrypts the hidden information by using the IDEA encryption algorithm. Which of the following tools is John using for steganography?

  1. Image Hide

  2. 2Mosaic

  3. Snow.exe

  4. Netcat

Answer: C

Question No: 60 – (Topic 1)

Network mapping provides a security testing team with a blueprint of the organization. Which of the following steps is NOT a part of manual network mapping?

  1. Gathering private and public IP addresses

  2. Collecting employees information

  3. Banner grabbing

  4. Performing Neotracerouting

Answer: D

100% Free Download!
Download Free Demo:GCIH Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GCIH Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE