Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GIAC GCIH Dumps

Page: 1 / 12
Total 328 questions

GIAC Certified Incident Handler Questions and Answers

Question 1

You are monitoring your network's behavior. You find a sudden increase in traffic on the network. It seems to come in bursts and emanate from one specific machine. You have been able to determine that a user of that machine is unaware of the activity and lacks the computer knowledge required to be responsible for a computer attack. What attack might this indicate?

Options:

A.

Spyware

B.

Ping Flood

C.

Denial of Service

D.

Session Hijacking

Buy Now
Question 2

Which of the following types of channels is used by Trojans for communication?

Options:

A.

Loop channel

B.

Open channel

C.

Covert channel

D.

Overt channel

Question 3

Which of the following is an Internet mapping technique that relies on various BGP collectors that collect information such as routing updates and tables and provide this information publicly?

Options:

A.

AS Route Inference

B.

Path MTU discovery (PMTUD)

C.

AS PATH Inference

D.

Firewalking

Question 4

Which of the following is the method of hiding data within another media type such as graphic or document?

Options:

A.

Spoofing

B.

Steganography

C.

Packet sniffing

D.

Cryptanalysis

Question 5

Which of the following threats is a combination of worm, virus, and Trojan horse characteristics?

Options:

A.

Spyware

B.

Heuristic

C.

Blended

D.

Rootkits

Question 6

Which of the following is the most common vulnerability that can affect desktop applications written in native code?

Options:

A.

SpyWare

B.

DDoS attack

C.

Malware

D.

Buffer overflow

Question 7

Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denialof-service, or unauthorized changes to system hardware, software, or data?

Options:

A.

Disaster Recovery Plan

B.

Cyber Incident Response Plan

C.

Crisis Communication Plan

D.

Occupant Emergency Plan

Question 8

You want to create an SSH tunnel for POP and SMTP protocols. Which of the following commands will you run?

Options:

A.

ssh -L 110:mailhost:110 -L 25

B.

ssh -L 110:mailhost:110 -L 25:mailhost:25 -1

C.

ssh -L 25:mailhost:110 -L 110

D.

ssh -L 110:mailhost:110 -L 25:mailhost:25 -1 user -N mailhost

Question 9

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. Your company is facing an IP spoofing attack.

Which of the following tools will you use to get an alert saying that an upcoming IP packet is being spoofed?

Options:

A.

Despoof

B.

Dsniff

C.

ethereal

D.

Neotrace

Question 10

Which of the following is a process of searching unauthorized modems?

Options:

A.

Espionage

B.

Wardialing

C.

System auditing

D.

Scavenging

Question 11

Which of the following protocol loggers is used to detect ping sweep?

Options:

A.

lppi

B.

pitl

C.

dpsl

D.

ippl

Question 12

In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?

Options:

A.

Session fixation

B.

Cross-site scripting

C.

Session sidejacking

D.

ARP spoofing

Question 13

Which of the following applications is NOT used for passive OS fingerprinting?

Options:

A.

Networkminer

B.

Satori

C.

p0f

D.

Nmap

Question 14

When you conduct the XMAS scanning using Nmap, you find that most of the ports scanned do not give a response. What can be the state of these ports?

Options:

A.

Filtered

B.

Open

C.

Closed

Question 15

Fill in the blank with the appropriate name of the tool.

______ scans for rootkits by comparing SHA-1 hashes of important files with known good ones in online database.

Options:

Question 16

Which of the following virus is a script that attaches itself to a file or template?

Options:

A.

Boot sector

B.

Trojan horse

C.

Macro virus

D.

E-mail virus

Question 17

Which of the following programs is used for bypassing normal authentication for securing remote access to a computer?

Options:

A.

Backdoor

B.

Worm

C.

Adware

D.

Spyware

Question 18

Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords?

Options:

A.

Rainbow attack

B.

Brute Force attack

C.

Dictionary attack

D.

Hybrid attack

Question 19

Which of the following statements are true about tcp wrappers?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

tcp wrapper provides access control, host address spoofing, client username lookups, etc.

B.

When a user uses a TCP wrapper, the inetd daemon runs the wrapper program tcpd instead of running the server program directly.

C.

tcp wrapper allows host or subnetwork IP addresses, names and/or ident query replies, to be used as tokens to filter for access control purposes.

D.

tcp wrapper protects a Linux server from IP address spoofing.

Question 20

Which of the following methods can be used to detect session hijacking attack?

Options:

A.

nmap

B.

Brutus

C.

ntop

D.

sniffer

Question 21

Which of the following tools is used for vulnerability scanning and calls Hydra to launch a dictionary attack?

Options:

A.

Whishker

B.

Nessus

C.

SARA

D.

Nmap

Question 22

Adam works as a Security Analyst for Umbrella Inc. Company has a Windows-based network. All computers run on Windows XP. Manager of the Sales department complains Adam about the unusual behavior of his computer. He told Adam that some pornographic contents are suddenly appeared on his computer overnight. Adam suspects that some malicious software or Trojans have been installed on the computer. He runs some diagnostics programs and Port scanners and found that the Port 12345, 12346, and 20034 are open. Adam also noticed some tampering with the Windows registry, which causes one application to run every time when Windows start.

Which of the following is the most likely reason behind this issue?

Options:

A.

Cheops-ng is installed on the computer.

B.

Elsave is installed on the computer.

C.

NetBus is installed on the computer.

D.

NetStumbler is installed on the computer.

Question 23

Which of the following types of attacks is only intended to make a computer resource unavailable to its users?

Options:

A.

Denial of Service attack

B.

Replay attack

C.

Teardrop attack

D.

Land attack

Question 24

Which of the following tools can be used for steganography?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Image hide

B.

Stegbreak

C.

Snow.exe

D.

Anti-x

Question 25

Which of the following takes control of a session between a server and a client using TELNET, FTP, or any other non-encrypted TCP/IP utility?

Options:

A.

Dictionary attack

B.

Session Hijacking

C.

Trojan horse

D.

Social Engineering

Question 26

John works as a professional Ethical Hacker. He has been assigned a project to test the security of On the We-are-secure login page, he enters ='or''=' as a username and successfully logs in to the user page of the Web site.

The we-are-secure login page is vulnerable to a __________.

Options:

A.

Dictionary attack

B.

SQL injection attack

C.

Replay attack

D.

Land attack

Question 27

You run the following command while using Nikto Web scanner:

perl nikto.pl -h 192.168.0.1 -p 443

What action do you want to perform?

Options:

A.

Using it as a proxy server

B.

Updating Nikto

C.

Seting Nikto for network sniffing

D.

Port scanning

Question 28

Which of the following is a computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic?

Options:

A.

Klez

B.

Code red

C.

SQL Slammer

D.

Beast

Question 29

You are responsible for security at a company that uses a lot of Web applications. You are most concerned about flaws in those applications allowing some attacker to get into your network. What method would be best for finding such flaws?

Options:

A.

Manual penetration testing

B.

Code review

C.

Automated penetration testing

D.

Vulnerability scanning

Question 30

Adam works as a Security administrator for Umbrella Inc. He runs the following traceroute and notices that hops 19 and 20 both show the same IP address.

1 172.16.1.254 (172.16.1.254) 0.724 ms 3.285 ms 0.613 ms 2 ip68-98-176-1.nv.nv.cox.net

(68.98.176.1) 12.169 ms 14.958 ms 13.416 ms 3 ip68-98-176-1.nv.nv.cox.net

(68.98.176.1) 13.948 ms ip68-100-0-1.nv.nv. cox.net (68.100.0.1) 16.743 ms 16.207 ms 4 ip68-100-0-137.nv.nv.cox.net (68.100.0.137) 17.324 ms 13.933 ms 20.938 ms 5 68.1.1.4

(68.1.1.4) 12.439 ms 220.166 ms 204.170 ms

6 so-6-0-0.gar2.wdc1.Level3.net (67.29.170.1) 16.177 ms 25.943 ms 14.104 ms 7

unknown.Level3.net (209.247.9.173) 14.227 ms 17.553 ms 15.415 ms "PassGuide" - 8 so-0-1-0.bbr1.NewYork1.level3.net (64.159.1.41) 17.063 ms 20.960 ms 19.512 ms 9 so-7-0-0.gar1. NewYork1.Level3.net (64.159.1.182) 20.334 ms 19.440 ms 17.938 ms 10 so-4-0-0.edge1.NewYork1.Level3.

net (209.244.17.74) 27.526 ms 18.317 ms 21.202 ms 11 uunet-level3- oc48.NewYork1.Level3.net

(209.244.160.12) 21.411 ms 19.133 ms 18.830 ms 12 0.so-6-0-0.XL1.NYC4.ALTER.NET (152.63.21.78)

21.203 ms 22.670 ms 20.111 ms 13 0.so-2-0-0.TL1.NYC8.ALTER.NET (152.63.0.153) 30.929 ms 24.858 ms

23.108 ms 14 0.so-4-1-0.TL1.ATL5.ALTER.NET (152.63.10.129) 37.894 ms 33.244 ms

33.910 ms 15 0.so-7-0-0.XL1.MIA4.ALTER.NET (152.63.86.189) 51.165 ms 49.935 ms

49.466 ms 16 0.so-3-0-0.XR1.MIA4.ALTER.

NET (152.63.101.41) 50.937 ms 49.005 ms 51.055 ms 17 117.ATM6- 0.GW5.MIA1.ALTER.NET (152.63.82.73) 51.897 ms 50.280 ms 53.647 ms 18 PassGuidegw1. customer.alter.net (65.195.239.14) 51.921 ms 51.571 ms 56.855 ms 19 www.PassGuide.com (65.195.239.22) 52.191 ms 52.571 ms 56.855 ms 20 www.PassGuide.com (65.195.239.22) 53.561 ms 54.121 ms 58.333 ms

Which of the following is the most like cause of this issue?

Options:

A.

An application firewall

B.

Intrusion Detection System

C.

Network Intrusion system

D.

A stateful inspection firewall

Question 31

Your company has been hired to provide consultancy, development, and integration services for a company named Brainbridge International. You have prepared a case study to plan the upgrade for the company. Based on the case study, which of the following steps will you suggest for configuring WebStore1?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Customize IIS 6.0 to display a legal warning page on the generation of the 404.2 and 404.3 errors.

B.

Move the WebStore1 server to the internal network.

C.

Configure IIS 6.0 on WebStore1 to scan the URL for known buffer overflow attacks.

D.

Move the computer account of WebStore1 to the Remote organizational unit (OU).

Question 32

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure.com Web site. For this, you want to perform the idle scan so that you can get the ports open in the we-are-secure.com server. You are using Hping tool to perform the idle scan by using a zombie computer. While scanning, you notice that every IPID is being incremented on every query, regardless whether the ports are open or close. Sometimes, IPID is being incremented by more than one value.

What may be the reason?

Options:

A.

The firewall is blocking the scanning process.

B.

The zombie computer is not connected to the we-are-secure.com Web server.

C.

The zombie computer is the system interacting with some other system besides your computer.

D.

Hping does not perform idle scanning.

Question 33

You work as a Network Administrator for InformSec Inc. You find that the TCP port number 23476 is open on your server. You suspect that there may be a Trojan named Donald Dick installed on your server. Now you want to verify whether Donald Dick is installed on it or not. For this, you want to know the process running on port 23476, as well as the process id, process name, and the path of the process on your server. Which of the following applications will you most likely use to accomplish the task?

Options:

A.

Tripwire

B.

SubSeven

C.

Netstat

D.

Fport

Question 34

Adam works as a Network Administrator for PassGuide Inc. He wants to prevent the network from DOS attacks. Which of the following is most useful against DOS attacks?

Options:

A.

SPI

B.

Distributive firewall

C.

Honey Pot

D.

Internet bot

Question 35

Firekiller 2000 is an example of a __________.

Options:

A.

Security software disabler Trojan

B.

DoS attack Trojan

C.

Data sending Trojan

D.

Remote access Trojan

Question 36

Which of the following rootkits is used to attack against full disk encryption systems?

Options:

A.

Boot loader rootkit

B.

Library rootkit

C.

Hypervisor rootkit

D.

Kernel level rootkit

Question 37

Which of the following is a technique for creating Internet maps?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Active Probing

B.

AS PATH Inference

C.

Object Relational Mapping

D.

Network Quota

Question 38

Adam, a malicious hacker is sniffing the network to inject ARP packets. He injects broadcast frames onto the wire to conduct Man-in-The-Middle attack.

Which of the following is the destination MAC address of a broadcast frame?

Options:

A.

0xDDDDDDDDD

B.

0x00000000000

C.

0xFFFFFFFFFFFF

D.

0xAAAAAAAAAA

Question 39

Which of the following tools can be used as penetration tools in the Information system auditing process?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Nmap

B.

Snort

C.

SARA

D.

Nessus

Question 40

Which of the following can be used as a Trojan vector to infect an information system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

NetBIOS remote installation

B.

Any fake executable

C.

Spywares and adware

D.

ActiveX controls, VBScript, and Java scripts

Question 41

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

Options:

A.

Nmap

B.

Ethereal

C.

Ettercap

D.

Netcraft

Question 42

Which of the following are open-source vulnerability scanners?

Options:

A.

Nessus

B.

Hackbot

C.

NetRecon

D.

Nikto

Question 43

Fill in the blank with the appropriate name of the attack.

______ takes best advantage of an existing authenticated connection

Options:

Question 44

You want to integrate the Nikto tool with nessus vulnerability scanner. Which of the following steps will you take to accomplish the task?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Place nikto.pl file in the /etc/nessus directory.

B.

Place nikto.pl file in the /var/www directory.

C.

Place the directory containing nikto.pl in root's PATH environment variable.

D.

Restart nessusd service.

Question 45

Your friend plans to install a Trojan on your computer. He knows that if he gives you a new version of chess.exe, you will definitely install the game on your computer. He picks up a Trojan and joins it with chess.exe. Which of the following tools are required in such a scenario?

Each correct answer represents a part of the solution. Choose three.

Options:

A.

NetBus

B.

Absinthe

C.

Yet Another Binder

D.

Chess.exe

Question 46

Fill in the blank with the appropriate name of the rootkit.

A _______ rootkit uses device or platform firmware to create a persistent malware image.

Options:

Question 47

In which of the following methods does an hacker use packet sniffing to read network traffic between two parties to steal the session cookies?

Options:

A.

Cross-site scripting

B.

Physical accessing

C.

Session fixation

D.

Session sidejacking

Question 48

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Linguistic steganography

B.

Perceptual masking

C.

Technical steganography

D.

Text Semagrams

Question 49

Which of the following programming languages are NOT vulnerable to buffer overflow attacks?

Each correct answer represents a complete solution. Choose two.

Options:

A.

C

B.

Java

C.

C++

D.

Perl

Page: 1 / 12
Total 328 questions