GCIH | A Review Of Printable GCIH Free Practice Exam

It is impossible to pass GIAC GCIH exam without any help in the short term. Come to Pass4sure soon and find the most advanced, correct and guaranteed GIAC GCIH practice questions. You will get a surprising result by our Up to the immediate present GIAC Certified Incident Handler practice guides.

Check GCIH free dumps before getting the full version:

NEW QUESTION 1
Jane works as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. Jane is troubleshooting the computer of a user who has installed software that automatically gains full permissions on his computer. Jane has never seen this software before. Which of the following types of malware is the user facing on his computer?

  • A. Rootkits
  • B. Viruses
  • C. Spyware
  • D. Adware

Answer: A

NEW QUESTION 2
Which of the following tools uses common UNIX/Linux tools like the strings and grep commands to search core system programs for signatures of the rootkits?

  • A. rkhunter
  • B. OSSEC
  • C. chkrootkit
  • D. Blue Pill

Answer: C

NEW QUESTION 3
Which of the following wireless network security solutions refers to an authentication process in which a user can connect wireless access points to a centralized server to ensure that all hosts are properly authenticated?

  • A. Remote Authentication Dial-In User Service (RADIUS)
  • B. IEEE 802.1x
  • C. Wired Equivalent Privacy (WEP)
  • D. Wi-Fi Protected Access 2 (WPA2)

Answer: B

NEW QUESTION 4
Mark works as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company uses Check Point SmartDefense to provide security to the network. Mark uses SmartDefense on the HTTP servers of the company to fix the limitation for the maximum response header length. Which of the following attacks can be blocked by defining this limitation?

  • A. HTR Overflow worms and mutations
  • B. Ramen worm attack
  • C. Melissa virus attack
  • D. Shoulder surfing attack

Answer: A

NEW QUESTION 5
Which of the following incident response team members ensures that the policies of the organization are enforced during the incident response?

  • A. Information Security representative
  • B. Legal representative
  • C. Human Resource
  • D. Technical representative

Answer: C

NEW QUESTION 6
Adam, a malicious hacker, wants to perform a reliable scan against a remote target. He is not concerned about being stealth at this point.
Which of the following type of scans would be most accurate and reliable?

  • A. UDP sacn
  • B. TCP Connect scan
  • C. ACK scan
  • D. Fin scan

Answer: B

NEW QUESTION 7
Which of the following is a reason to implement security logging on a DNS server?

  • A. For preventing malware attacks on a DNS server
  • B. For measuring a DNS server's performance
  • C. For monitoring unauthorized zone transfer
  • D. For recording the number of queries resolved

Answer: C

NEW QUESTION 8
Which of the following applications is an example of a data-sending Trojan?

  • A. SubSeven
  • B. Senna Spy Generator
  • C. Firekiller 2000
  • D. eBlaster

Answer: D

NEW QUESTION 9
You want to connect to your friend's computer and run a Trojan on it. Which of the following tools will you use to accomplish the task?

  • A. PSExec
  • B. Remoxec
  • C. Hk.exe
  • D. GetAdmin.exe

Answer: A

NEW QUESTION 10
CORRECT TEXT
Fill in the blank with the appropriate option to complete the statement below.
You want to block all UDP packets coming to the Linux server using the portsentry utility. For this, you have to enable the ______ option in the portsentry configuration file.

  • A.

Answer: BLOCK_UDP

NEW QUESTION 11
Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Slack space
  • B. Hidden partition
  • C. Dumb space
  • D. Unused Sectors

Answer: ABD

NEW QUESTION 12
CORRECT TEXT
Fill in the blank with the appropriate name of the rootkit.
A _______ rootkit uses device or platform firmware to create a persistent malware image.

  • A.

Answer: firmware

NEW QUESTION 13
Which of the following is a technique for creating Internet maps?
Each correct answer represents a complete solution. Choose two.

  • A. Active Probing
  • B. AS PATH Inference
  • C. Object Relational Mapping
  • D. Network Quota

Answer: AB

NEW QUESTION 14
Which of the following is used to determine the operating system on the remote computer in a network environment?

  • A. Spoofing
  • B. Reconnaissance
  • C. OS Fingerprinting
  • D. Social engineering

Answer: C

NEW QUESTION 15
Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denialof-service, or unauthorized changes to system hardware, software, or data?

  • A. Disaster Recovery Plan
  • B. Cyber Incident Response Plan
  • C. Crisis Communication Plan
  • D. Occupant Emergency Plan

Answer: B

NEW QUESTION 16
Sharpening, Rotating, Resampling, and Softening the image.
Which of the following Steganography attacks is Victor using?

  • A. Stegdetect Attack
  • B. Chosen-Stego Attack
  • C. Steg-Only Attack
  • D. Active Attacks

Answer: D

NEW QUESTION 17
You work as a System Administrator in SunSoft Inc. You are running a virtual machine on Windows Server 2003. The virtual machine is protected by DPM. Now, you want to move the virtual machine to another host. Which of the following steps can you use to accomplish the task?
Each correct answer represents a part of the solution. Choose all that apply.

  • A. Remove the original virtual machine from the old server and stop the protection for the original virtual machine.
  • B. Run consistency check.
  • C. Add the copied virtual machine to a protection group.
  • D. Copy the virtual machine to the new server.

Answer: ACD

NEW QUESTION 18
......

P.S. Easily pass GCIH Exam with 328 Q&As Allfreedumps.com Dumps & pdf Version, Welcome to Download the Newest Allfreedumps.com GCIH Dumps: https://www.allfreedumps.com/GCIH-dumps.html (328 New Questions)