New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Vce GCIH Questions Latest

Page: 5 / 12
Total 328 questions

GIAC Certified Incident Handler Questions and Answers

Question 17

Which of the following programs is used for bypassing normal authentication for securing remote access to a computer?

Options:

A.

Backdoor

B.

Worm

C.

Adware

D.

Spyware

Question 18

Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords?

Options:

A.

Rainbow attack

B.

Brute Force attack

C.

Dictionary attack

D.

Hybrid attack

Question 19

Which of the following statements are true about tcp wrappers?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

tcp wrapper provides access control, host address spoofing, client username lookups, etc.

B.

When a user uses a TCP wrapper, the inetd daemon runs the wrapper program tcpd instead of running the server program directly.

C.

tcp wrapper allows host or subnetwork IP addresses, names and/or ident query replies, to be used as tokens to filter for access control purposes.

D.

tcp wrapper protects a Linux server from IP address spoofing.

Question 20

Which of the following methods can be used to detect session hijacking attack?

Options:

A.

nmap

B.

Brutus

C.

ntop

D.

sniffer

Page: 5 / 12
Total 328 questions