New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Security Administration GCIH Exam Questions and Answers PDF

Page: 10 / 12
Total 328 questions

GIAC Certified Incident Handler Questions and Answers

Question 37

Which of the following is a technique for creating Internet maps?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Active Probing

B.

AS PATH Inference

C.

Object Relational Mapping

D.

Network Quota

Question 38

Adam, a malicious hacker is sniffing the network to inject ARP packets. He injects broadcast frames onto the wire to conduct Man-in-The-Middle attack.

Which of the following is the destination MAC address of a broadcast frame?

Options:

A.

0xDDDDDDDDD

B.

0x00000000000

C.

0xFFFFFFFFFFFF

D.

0xAAAAAAAAAA

Question 39

Which of the following tools can be used as penetration tools in the Information system auditing process?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Nmap

B.

Snort

C.

SARA

D.

Nessus

Question 40

Which of the following can be used as a Trojan vector to infect an information system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

NetBIOS remote installation

B.

Any fake executable

C.

Spywares and adware

D.

ActiveX controls, VBScript, and Java scripts

Page: 10 / 12
Total 328 questions