Halloween Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Security Administration Changed GCIH Questions

Page: 7 / 12
Total 328 questions

GIAC Certified Incident Handler Questions and Answers

Question 25

Which of the following takes control of a session between a server and a client using TELNET, FTP, or any other non-encrypted TCP/IP utility?

Options:

A.

Dictionary attack

B.

Session Hijacking

C.

Trojan horse

D.

Social Engineering

Question 26

John works as a professional Ethical Hacker. He has been assigned a project to test the security of On the We-are-secure login page, he enters ='or''=' as a username and successfully logs in to the user page of the Web site.

The we-are-secure login page is vulnerable to a __________.

Options:

A.

Dictionary attack

B.

SQL injection attack

C.

Replay attack

D.

Land attack

Question 27

You run the following command while using Nikto Web scanner:

perl nikto.pl -h 192.168.0.1 -p 443

What action do you want to perform?

Options:

A.

Using it as a proxy server

B.

Updating Nikto

C.

Seting Nikto for network sniffing

D.

Port scanning

Question 28

Which of the following is a computer worm that caused a denial of service on some Internet hosts and dramatically slowed down general Internet traffic?

Options:

A.

Klez

B.

Code red

C.

SQL Slammer

D.

Beast

Page: 7 / 12
Total 328 questions