Pass4sure GCIH Questions are updated and all GCIH answers are verified by experts. Once you have completely prepared with our GCIH exam prep kits you will be ready for the real GCIH exam without a problem. We have Abreast of the times GIAC GCIH dumps study guide. PASSED GCIH First attempt! Here What I Did.
Online GIAC GCIH free dumps demo Below:
NEW QUESTION 1
Which of the following types of channels is used by Trojans for communication?
Answer: C
NEW QUESTION 2
Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:
Answer: A
NEW QUESTION 3
Mark works as a Network Administrator for Perfect Inc. The company has both wired and wireless networks. An attacker attempts to keep legitimate users from accessing services that they require. Mark uses IDS/IPS sensors on the wired network to mitigate the attack. Which of the following attacks best describes the attacker's intentions?
Answer: D
NEW QUESTION 4
Which of the following rootkits is used to attack against full disk encryption systems?
Answer: A
NEW QUESTION 5
Which of the following refers to applications or files that are not classified as viruses or Trojan horse programs, but can still negatively affect the performance of the computers on your network and introduce significant security risks to your organization?
Answer: B
NEW QUESTION 6
Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him that he would like to use some type of hardware device in tandem with a security or identifying pin number. Adam decides to implement smart cards but they are not cost effective.
Which of the following types of hardware devices will Adam use to implement two-factor authentication?
Answer: B
NEW QUESTION 7
Which of the following types of malware does not replicate itself but can spread only when the circumstances are beneficial?
Answer: D
NEW QUESTION 8
Which of the following is executed when a predetermined event occurs?
Answer: B
NEW QUESTION 9
Which of the following incident response team members ensures that the policies of the organization are enforced during the incident response?
Answer: C
NEW QUESTION 10
Which of the following is a type of computer security vulnerability typically found in Web applications that allow code injection by malicious Web users into the Web pages viewed by other users?
Answer: C
NEW QUESTION 11
Adam works as a Network administrator for Umbrella Inc. He noticed that an ICMP ECHO requests is coming from some suspected outside sources. Adam suspects that some malicious hacker is trying to perform ping sweep attack on the network of the company. To stop this malicious activity, Adam blocks the ICMP ECHO request from any outside sources.
What will be the effect of the action taken by Adam?
Answer: B
NEW QUESTION 12
You have inserted a Trojan on your friend's computer and you want to put it in the startup so that whenever the computer reboots the Trojan will start to run on the startup. Which of the following registry entries will you edit to accomplish the task?
Answer: C
NEW QUESTION 13
Which of the following strategies allows a user to limit access according to unique hardware information supplied by a potential client?
Answer: C
NEW QUESTION 14
Which of the following statements are true about tcp wrappers?
Each correct answer represents a complete solution. Choose all that apply.
Answer: ABC
NEW QUESTION 15
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following steps of the pre- attack phase:
l Information gathering
l Determining network range
l Identifying active machines
l Finding open ports and applications
l OS fingerprinting
l Fingerprinting services
Now John wants to perform network mapping of the We-are-secure network. Which of the following tools can he use to accomplish his task?
Each correct answer represents a complete solution. Choose all that apply.
Answer: BCD
NEW QUESTION 16
Mark works as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company uses Check Point SmartDefense to provide security to the network. Mark uses SmartDefense on the HTTP servers of the company to fix the limitation for the maximum response header length. Which of the following attacks can be blocked by defining this limitation?
Answer: A
NEW QUESTION 17
Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?
Answer: B
NEW QUESTION 18
John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-based network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the company complains to John that his system contains an unknown package named as tar.gz and his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that the other computers on the network are also facing the same problem. John discovers that a malicious application is using the synscan tool to randomly generate IP addresses.
Which of the following worms has attacked the computer?
Answer: B
NEW QUESTION 19
Which of the following is a technique for creating Internet maps?
Each correct answer represents a complete solution. Choose two.
Answer: AB
NEW QUESTION 20
Adam is a novice Web user. He chooses a 22 letters long word from the dictionary as his password.
How long will it take to crack the password by an attacker?
Answer: D
NEW QUESTION 21
......
Recommend!! Get the Full GCIH dumps in VCE and PDF From DumpSolutions.com, Welcome to Download: https://www.dumpsolutions.com/GCIH-dumps/ (New 328 Q&As Version)