[Free] 2017(Sep) CollectDumps Dumpsleader GIAC GCIH Dumps with VCE and PDF 81-90

CollectDumps 2017 Sep GIAC Official New Released GCIH
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GCIH.html

GIAC Certified Incident Handler

Question No: 81 – (Topic 1)

Which of the following Nmap commands is used to perform a UDP port scan?

  1. nmap -sY

  2. nmap -sS

  3. nmap -sN

  4. nmap -sU

Answer: D

Question No: 82 – (Topic 1)

Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?

Each correct answer represents a complete solution. Choose two.

  1. Land attack

  2. SYN flood attack

  3. Teardrop attack

  4. Ping of Death attack

Answer: C,D

Question No: 83 – (Topic 1)

What is the major difference between a worm and a Trojan horse?

  1. A worm spreads via e-mail, while a Trojan horse does not.

  2. A worm is a form of malicious program, while a Trojan horse is a utility.

  3. A worm is self replicating, while a Trojan horse is not.

  4. A Trojan horse is a malicious program, while a worm is an anti-virus software.

Answer: C

Question No: 84 – (Topic 1)

Which of the following attacks come under the category of layer 2 Denial-of-Service attacks?

Each correct answer represents a complete solution. Choose all that apply.

  1. Spoofing attack

  2. SYN flood attack

  3. Password cracking

  4. RF jamming attack

Answer: A,B

Question No: 85 – (Topic 1)

You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The company has three Windows 2008 file servers, 150 Windows XP Professional, thirty UNIX-based client computers. The network users have identical user accounts for both Active Directory and

the UNIX realm. You want to ensure that the UNIX clients on the network can access the file servers. You also want to ensure that the users are able to access all resources by logging on only once, and that no additional software is installed on the UNIX clients. What will you do to accomplish this task?

Each correct answer represents a part of the solution. Choose two.

  1. Configure a distributed file system (Dfs) on the file server in the network.

  2. Enable the Network File System (NFS) component on the file servers in the network.

  3. Configure ADRMS on the file servers in the network.

  4. Enable User Name Mapping on the file servers in the network.

Answer: B,D

Question No: 86 – (Topic 1)

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP- based network. An attacker uses software that keeps trying password combinations until the correct password is found. Which type of attack is this?

  1. Denial-of-Service

  2. Man-in-the-middle

  3. Brute Force

  4. Vulnerability

Answer: C

Question No: 87 – (Topic 1)

You want to scan your network quickly to detect live hosts by using ICMP ECHO Requests. What type of scanning will you perform to accomplish the task?

  1. Idle scan

  2. TCP SYN scan

  3. XMAS scan

  4. Ping sweep scan

Answer: D

Question No: 88 – (Topic 1)

Adam, a novice computer user, works primarily from home as a medical professional. He just bought a brand new Dual Core Pentium computer with over 3 GB of RAM. After about two months of working on his new computer, he notices that it is not running nearly as fast as it used to. Adam uses antivirus software, anti-spyware software, and keeps the computer up-to-date with Microsoft patches. After another month of working on the computer, Adam finds that his computer is even more noticeably slow. He also notices a window or two pop-up on his screen, but they quickly disappear. He has seen these windows show up, even when he has not been on the Internet. Adam notices that his computer only has about 10 GB of free space available. Since his hard drive is a 200 GB hard drive, Adam thinks this is very odd.

Which of the following is the mostly likely the cause of the problem?

  1. Computer is infected with the stealth kernel level rootkit.

  2. Computer is infected with stealth virus.

  3. Computer is infected with the Stealth Trojan Virus.

  4. Computer is infected with the Self-Replication Worm.

Answer: A

Question No: 89 CORRECT TEXT – (Topic 1)

Fill in the blank with the appropriate word.

StackGuard (as used by Immunix), ssp/ProPolice (as used by OpenBSD), and Microsoft#39;s

/GS option use defense against buffer overflow attacks.

Answer: canary

Question No: 90 – (Topic 1)

Adam has installed and configured his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Adam notices that when he uses his wireless connection, the speed is sometimes 16 Mbps and sometimes it is only 8 Mbps or less.

Adam connects to the management utility wireless router and finds out that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router#39;s logs and notices that the unfamiliar machine has the same MAC address as his laptop.

Which of the following attacks has been occurred on the wireless network of Adam?

  1. NAT spoofing

  2. DNS cache poisoning

  3. MAC spoofing

  4. ARP spoofing

Answer: C

100% Free Download!
Download Free Demo:GCIH Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GCIH Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE