[Free] 2017(Sep) EnsurePass Testinsides GIAC GCIH Dumps with VCE and PDF 161-170

Ensurepass.com : Ensure you pass the IT Exams
2017 Sep GIAC Official New Released GCIH
100% Free Download! 100% Pass Guaranteed!

GIAC Certified Incident Handler

Question No: 161 – (Topic 2)

Which of the following is a version of netcat with integrated transport encryption capabilities?

  1. Encat

  2. Nikto

  3. Socat

  4. Cryptcat

Answer: D

Question No: 162 CORRECT TEXT – (Topic 2)

Fill in the blank with the appropriate name of the rootkit.

A rootkit uses device or platform firmware to create a persistent malware image.

Answer: firmware

Question No: 163 – (Topic 2)

In which of the following attacks does an attacker create the IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system?

  1. Rainbow attack

  2. IP address spoofing

  3. Cross-site request forgery

  4. Polymorphic shell code attack

Answer: B

Question No: 164 – (Topic 2)

In which of the following methods does an hacker use packet sniffing to read network traffic between two parties to steal the session cookies?

  1. Cross-site scripting

  2. Physical accessing

  3. Session fixation

  4. Session sidejacking

Answer: D

Question No: 165 – (Topic 2)

Which of the following tools will you use to prevent from session hijacking? Each correct answer represents a complete solution. Choose all that apply.

  1. OpenSSH

  2. Rlogin

  3. Telnet

  4. SSL

Answer: A,D

Question No: 166 – (Topic 2)

You discover that your network routers are being flooded with broadcast packets that have the return address of one of the servers on your network. This is resulting in an overwhelming amount of traffic going back to that server and flooding it. What is this called?

  1. Syn flood

  2. Blue jacking

  3. Smurf attack

  4. IP spoofing

Answer: C

Question No: 167 – (Topic 2)

Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses #39;Faulkner#39; as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew#39;s password?

Each correct answer represents a complete solution. Choose all that apply.

  1. Denial-of-service (DoS) attack

  2. Zero-day attack

  3. Brute force attack

  4. Social engineering

  5. Buffer-overflow attack

  6. Rainbow attack

  7. Password guessing

  8. Dictionary-based attack

Answer: C,D,F,G,H

Question No: 168 – (Topic 2)

Which of the following nmap command parameters is used for TCP SYN port scanning?

  1. -sF

  2. -sU

  3. -sX

  4. -sS

Answer: D

Question No: 169 – (Topic 2)

A user is sending a large number of protocol packets to a network in order to saturate its resources and to disrupt connections to prevent communications between services. Which type of attack is this?

  1. Vulnerability attack

  2. Impersonation attack

  3. Social Engineering attack

  4. Denial-of-Service attack

Answer: D

Question No: 170 – (Topic 2)

John works as a Network Administrator for Net Perfect Inc. The company has a Windows-

based network. The company uses Check Point SmartDefense to provide security to the network of the company. On the HTTP servers of the company, John defines a rule for dropping any kind of userdefined URLs. Which of the following types of attacks can be prevented by dropping the user-defined URLs?

  1. Morris worm

  2. Code red worm

  3. Hybrid attacks

  4. PTC worms and mutations

Answer: D

100% Ensurepass Free Download!
Download Free Demo:GCIH Demo PDF
100% Ensurepass Free Guaranteed!
Download 2017 EnsurePass GCIH Dumps

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.