New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GIAC Security Administration GCIH New Questions

Page: 3 / 12
Total 328 questions

GIAC Certified Incident Handler Questions and Answers

Question 9

You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are working as a root user on the Linux operating system. Your company is facing an IP spoofing attack.

Which of the following tools will you use to get an alert saying that an upcoming IP packet is being spoofed?

Options:

A.

Despoof

B.

Dsniff

C.

ethereal

D.

Neotrace

Question 10

Which of the following is a process of searching unauthorized modems?

Options:

A.

Espionage

B.

Wardialing

C.

System auditing

D.

Scavenging

Question 11

Which of the following protocol loggers is used to detect ping sweep?

Options:

A.

lppi

B.

pitl

C.

dpsl

D.

ippl

Question 12

In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?

Options:

A.

Session fixation

B.

Cross-site scripting

C.

Session sidejacking

D.

ARP spoofing

Page: 3 / 12
Total 328 questions