★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions

Free Instant Download NEW GCIH Exam Dumps (PDF & VCE):
Available on: https://www.certleader.com/GCIH-dumps.html


Exam Code: GCIH (Practice Exam Latest Test Questions VCE PDF)
Exam Name: GIAC Certified Incident Handler
Certification Provider: GIAC
Free Today! Guaranteed Training- Pass GCIH Exam.

Check GCIH free dumps before getting the full version:

NEW QUESTION 1
You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we- aresecure.com Web site. For this, you want to perform the idle scan so that you can get the ports open in the we-are-secure.com server. You are using Hping tool to perform the idle scan by using a zombie computer. While scanning, you notice that every IPID is being incremented on every query, regardless whether the ports are open or close. Sometimes, IPID is being incremented by more than one value.
What may be the reason?

  • A. The firewall is blocking the scanning process.
  • B. The zombie computer is not connected to the we-are-secure.com Web server.
  • C. The zombie computer is the system interacting with some other system besides your computer.
  • D. Hping does not perform idle scanning.

Answer: C

NEW QUESTION 2
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure server. The output of the scanning test is as follows:
C:\whisker.pl -h target_IP_address
-- whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - =
= Host: target_IP_address
= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1
mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22
+ 200 OK: HEAD /cgi-bin/printenv
John recognizes /cgi-bin/printenv vulnerability ('Printenv' vulnerability) in the We_are_secure server. Which of the following statements about 'Printenv' vulnerability are true?
Each correct answer represents a complete solution. Choose all that apply.

  • A. This vulnerability helps in a cross site scripting attack.
  • B. 'Printenv' vulnerability maintains a log file of user activities on the Website, which may be useful for the attacker.
  • C. The countermeasure to 'printenv' vulnerability is to remove the CGI script.
  • D. With the help of 'printenv' vulnerability, an attacker can input specially crafted links and/or other malicious scripts.

Answer: ACD

NEW QUESTION 3
Which of the following techniques can be used to map 'open' or 'pass through' ports on a gateway?

  • A. Traceport
  • B. Tracefire
  • C. Tracegate
  • D. Traceroute

Answer: D

NEW QUESTION 4
Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes. On the basis of above information, which of the following types of attack is Adam attempting to perform?

  • A. Fraggle attack
  • B. Ping of death attack
  • C. SYN Flood attack
  • D. Land attack

Answer: B

NEW QUESTION 5
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. An attacker uses software that keeps trying password combinations until the correct password is found. Which type of attack is this?

  • A. Denial-of-Service
  • B. Man-in-the-middle
  • C. Brute Force
  • D. Vulnerability

Answer: C

NEW QUESTION 6
Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?
Each correct answer represents a part of the solution. Choose all that apply.

  • A. Linguistic steganography
  • B. Perceptual masking
  • C. Technical steganography
  • D. Text Semagrams

Answer: AD

NEW QUESTION 7
In which of the following methods does an hacker use packet sniffing to read network traffic between two parties to steal the session cookies?

  • A. Cross-site scripting
  • B. Physical accessing
  • C. Session fixation
  • D. Session sidejacking

Answer: D

NEW QUESTION 8
You work as a Security Administrator for Net Perfect Inc. The company has a Windows-based network. You want to use a scanning technique which works as a reconnaissance attack. The technique should direct to a specific host or network to determine the services that the host offers.
Which of the following scanning techniques can you use to accomplish the task?

  • A. IDLE scan
  • B. Nmap
  • C. SYN scan
  • D. Host port scan

Answer: D

NEW QUESTION 9
Which of the following tools is described in the statement given below?
"It has a database containing signatures to be able to detect hundreds of vulnerabilities in UNIX, Windows, and commonly used web CGI scripts. Moreover, the database detects DdoS zombies and Trojans as well."

  • A. SARA
  • B. Nessus
  • C. Anti-x
  • D. Nmap

Answer: B

NEW QUESTION 10
John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare-secure.com. He is working on the Linux operating system. He wants to sniff the we- are-secure network and intercept a conversation between two employees of the company through session hijacking. Which of the following tools will John use to accomplish the task?

  • A. Hunt
  • B. IPChains
  • C. Ethercap
  • D. Tripwire

Answer: A

NEW QUESTION 11
Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?

  • A. Piggybacking
  • B. Hacking
  • C. Session hijacking
  • D. Keystroke logging

Answer: C

NEW QUESTION 12
Which of the following ensures that the investigation process of incident response team does not break any laws during the response to an incident?

  • A. Information Security representative
  • B. Lead Investigator
  • C. Legal representative
  • D. Human Resource

Answer: C

NEW QUESTION 13
Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

  • A. Buffer-overflow attack
  • B. Shoulder surfing attack
  • C. Man-in-the-middle attack
  • D. Denial-of-Service (DoS) attack

Answer: B

NEW QUESTION 14
John, a part-time hacker, has accessed in unauthorized way to the www.yourbank.com banking Website and stolen the bank account information of its users and their credit card numbers by using the SQL injection attack. Now, John wants to sell this information to malicious person Mark and make a deal to get a good amount of money. Since, he does not want to send the hacked information in the clear text format to Mark; he decides to send information in hidden text. For this, he takes a steganography tool and hides the information in ASCII text by appending whitespace to the end of lines and encrypts the hidden information by using the IDEA encryption algorithm. Which of the following tools is John using for steganography?

  • A. Image Hide
  • B. 2Mosaic
  • C. Snow.exe
  • D. Netcat

Answer: C

NEW QUESTION 15
Which of the following tools can be used for network sniffing as well as for intercepting conversations through session hijacking?

  • A. Ethercap
  • B. Tripwire
  • C. IPChains
  • D. Hunt

Answer: D

NEW QUESTION 16
Which of the following types of rootkits replaces regular application binaries with Trojan fakes and modifies the behavior of existing applications using hooks, patches, or injected code?

  • A. Application level rootkit
  • B. Hypervisor rootkit
  • C. Kernel level rootkit
  • D. Boot loader rootkit

Answer: A

NEW QUESTION 17
Who are the primary victims of smurf attacks on the contemporary Internet system?

  • A. IRC servers are the primary victims to smurf attacks
  • B. FTP servers are the primary victims to smurf attacks
  • C. SMTP servers are the primary victims to smurf attacks
  • D. Mail servers are the primary victims to smurf attacks

Answer: A

NEW QUESTION 18
Which of the following options scans the networks for vulnerabilities regarding the security of a network?

  • A. System enumerators
  • B. Port enumerators
  • C. Network enumerators
  • D. Vulnerability enumerators

Answer: C

NEW QUESTION 19
......

P.S. Easily pass GCIH Exam with 328 Q&As Downloadfreepdf.net Dumps & pdf Version, Welcome to Download the Newest Downloadfreepdf.net GCIH Dumps: https://www.downloadfreepdf.net/GCIH-pdf-download.html (328 New Questions)