Winter Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Sure Pass Exam GCIH PDF

Page: 2 / 12
Total 328 questions

GIAC Certified Incident Handler Questions and Answers

Question 5

Which of the following threats is a combination of worm, virus, and Trojan horse characteristics?

Options:

A.

Spyware

B.

Heuristic

C.

Blended

D.

Rootkits

Question 6

Which of the following is the most common vulnerability that can affect desktop applications written in native code?

Options:

A.

SpyWare

B.

DDoS attack

C.

Malware

D.

Buffer overflow

Question 7

Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denialof-service, or unauthorized changes to system hardware, software, or data?

Options:

A.

Disaster Recovery Plan

B.

Cyber Incident Response Plan

C.

Crisis Communication Plan

D.

Occupant Emergency Plan

Question 8

You want to create an SSH tunnel for POP and SMTP protocols. Which of the following commands will you run?

Options:

A.

ssh -L 110:mailhost:110 -L 25

B.

ssh -L 110:mailhost:110 -L 25:mailhost:25 -1

C.

ssh -L 25:mailhost:110 -L 110

D.

ssh -L 110:mailhost:110 -L 25:mailhost:25 -1 user -N mailhost

Page: 2 / 12
Total 328 questions