Month End Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GCIH Exam Dumps : GIAC Certified Incident Handler

PDF
GCIH pdf
 Real Exam Questions and Answer
 Last Update: Jan 23, 2025
 Question and Answers: 328
 Compatible with all Devices
 Printable Format
 100% Pass Guaranteed
$25.5  $84.99
GCIH exam
PDF + Testing Engine
GCIH PDF + engine
 Both PDF & Practice Software
 Last Update: Jan 23, 2025
 Question and Answers: 328
 Discount Offer
 Download Free Demo
 24/7 Customer Support
$40.5  $134.99
Testing Engine
GCIH Engine
 Desktop Based Application
 Last Update: Jan 23, 2025
 Question and Answers: 328
 Create Multiple Test Sets
 Questions Regularly Updated
  90 Days Free Updates
  Windows and Mac Compatible
$30  $99.99

Verified By IT Certified Experts

CertsTopics.com Certified Safe Files

Up-To-Date Exam Study Material

99.5% High Success Pass Rate

100% Accurate Answers

Instant Downloads

Exam Questions And Answers PDF

Try Demo Before You Buy

Certification Exams with Helpful Questions And Answers

GIAC Certified Incident Handler Questions and Answers

Question 1

Which of the following virus is a script that attaches itself to a file or template?

Options:

A.

Boot sector

B.

Trojan horse

C.

Macro virus

D.

E-mail virus

Buy Now
Question 2

You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing. Recently, your company has assigned you a project to test the security of the we-aresecure.com Web site. For this, you want to perform the idle scan so that you can get the ports open in the we-are-secure.com server. You are using Hping tool to perform the idle scan by using a zombie computer. While scanning, you notice that every IPID is being incremented on every query, regardless whether the ports are open or close. Sometimes, IPID is being incremented by more than one value.

What may be the reason?

Options:

A.

The firewall is blocking the scanning process.

B.

The zombie computer is not connected to the we-are-secure.com Web server.

C.

The zombie computer is the system interacting with some other system besides your computer.

D.

Hping does not perform idle scanning.

Question 3

You want to integrate the Nikto tool with nessus vulnerability scanner. Which of the following steps will you take to accomplish the task?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Place nikto.pl file in the /etc/nessus directory.

B.

Place nikto.pl file in the /var/www directory.

C.

Place the directory containing nikto.pl in root's PATH environment variable.

D.

Restart nessusd service.