Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Security Administration GCIH Updated Exam

Page: 4 / 12
Total 328 questions

GIAC Certified Incident Handler Questions and Answers

Question 13

Which of the following applications is NOT used for passive OS fingerprinting?

Options:

A.

Networkminer

B.

Satori

C.

p0f

D.

Nmap

Question 14

When you conduct the XMAS scanning using Nmap, you find that most of the ports scanned do not give a response. What can be the state of these ports?

Options:

A.

Filtered

B.

Open

C.

Closed

Question 15

Fill in the blank with the appropriate name of the tool.

______ scans for rootkits by comparing SHA-1 hashes of important files with known good ones in online database.

Options:

Question 16

Which of the following virus is a script that attaches itself to a file or template?

Options:

A.

Boot sector

B.

Trojan horse

C.

Macro virus

D.

E-mail virus

Page: 4 / 12
Total 328 questions