Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Exactprep GCIH Questions

Page: 12 / 12
Total 328 questions

GIAC Certified Incident Handler Questions and Answers

Question 45

Your friend plans to install a Trojan on your computer. He knows that if he gives you a new version of chess.exe, you will definitely install the game on your computer. He picks up a Trojan and joins it with chess.exe. Which of the following tools are required in such a scenario?

Each correct answer represents a part of the solution. Choose three.

Options:

A.

NetBus

B.

Absinthe

C.

Yet Another Binder

D.

Chess.exe

Question 46

Fill in the blank with the appropriate name of the rootkit.

A _______ rootkit uses device or platform firmware to create a persistent malware image.

Options:

Question 47

In which of the following methods does an hacker use packet sniffing to read network traffic between two parties to steal the session cookies?

Options:

A.

Cross-site scripting

B.

Physical accessing

C.

Session fixation

D.

Session sidejacking

Question 48

Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Linguistic steganography

B.

Perceptual masking

C.

Technical steganography

D.

Text Semagrams

Page: 12 / 12
Total 328 questions