Title: GCIH VCE Questions Answers with GCIH Dumps
1GCIHGIAC Certified Incident Handler
2Among the various GCIH dumps providers,
(VceTests) is the premier and an authorized GCIH
Exam dumps provider which offers best GCIH VCE
Questions Answers for GIAC candidates. Here all
GCIH Exam Questions are approved by the team of
Industrial experts. Pass your GIAC Exam with our
valid GIAC GCIH dumps in the first shot.
3Features
https//www.vcetests.com/GCIH-vce.html
4GIAC GCIH Questions Answers
- Question No 1
- You work as a Penetration Tester for the Infosec
Inc. Your company takes the projects of security
auditing. Recently, your company has assigned you
a project to test the security of the
we-aresecure.com Web site. For this, you want to
perform the idle scan so that you can get the
ports open in the we-are-secure.com server. You
are using Hping tool to perform the idle scan by
using a zombie computer. While scanning, you
notice that every IPID is being incremented on
every query, regardless whether the ports are
open or close. Sometimes, IPID is being
incremented by more than one value. What may be
the reason? - A. The firewall is blocking the scanning process.
- B. The zombie computer is not connected to the
we-are-secure.com Web server. - C. The zombie computer is the system interacting
with some other system besides your computer. - D. Hping does not perform idle scanning.
- Answer C
https//www.vcetests.com/GCIH-vce.html
5GIAC GCIH Questions Answers
- Question No 2
- Which of the following is the process of
comparing cryptographic hash functions of system - executables and configuration files?
- A. Shoulder surfing
- B. File integrity auditing
- C. Reconnaissance
- D. Spoofing
- Answer B
https//www.vcetests.com/GCIH-vce.html
6GIAC GCIH Questions Answers
- Question No 3
- Which of the following rootkits is able to load
the original operating system as a virtual - machine, thereby enabling it to intercept all
hardware calls made by the original operating - system?
- A. Kernel level rootkit
- B. Boot loader rootkit
- C. Hypervisor rootkit
- D. Library rootkit
- Answer C
https//www.vcetests.com/GCIH-vce.html
7GIAC GCIH Questions Answers
- Question No 4
- Which of the following attacks are examples of
Denial-of-service attacks (DoS)? - Each correct answer represents a complete
solution. Choose all that apply. - A. Fraggle attack
- B. Smurf attack
- C. Birthday attack
- D. Ping flood attack
- Answer A,B,D
https//www.vcetests.com/GCIH-vce.html
8GIAC GCIH Questions Answers
- Question No 5
- Which of the following are countermeasures to
prevent unauthorized database access - attacks?
- Each correct answer represents a complete
solution. Choose all that apply. - A. Session encryption
- B. Removing all stored procedures
- C. Applying strong firewall rules
- D. Input sanitization
- Answer A,B,C,D
https//www.vcetests.com/GCIH-vce.html
9GIAC GCIH Questions Answers
- Question No 6
- Mark works as a Network Administrator for Net
Perfect Inc. The company has a Windowsbased
network. The company uses Check Point
SmartDefense to provide security to the network.
Mark uses SmartDefense on the HTTP servers of the
company to fix the limitation for the maximum
response header length. Which of the following
attacks can be blocked by defining this
limitation? - A. HTR Overflow worms and mutations
- B. Ramen worm attack
- C. Melissa virus attack
- D. Shoulder surfing attack
- Answer A
https//www.vcetests.com/GCIH-vce.html
10GIAC GCIH Questions Answers
- Question No 7
- You want to add a netbus Trojan in the chess.exe
game program so that you can gain remote access
to a friend's computer. Which of the following
tools will you use to accomplish the task? - Each correct answer represents a complete
solution. Choose all that apply. - A. Tripwire
- B. Yet Another Binder
- C. Pretator Wrapper
- D. Beast
- Answer B,C
https//www.vcetests.com/GCIH-vce.html
11GIAC GCIH Questions Answers
- Question No 8
- Which of the following attacks capture the secret
value like a hash and reuse it later to gain - access to a system without ever decrypting or
decoding the hash? - A. Cross Site Scripting attack
- B. Replay attack
- C. Rainbow attack
- D. Hashing attack
- Answer B
https//www.vcetests.com/GCIH-vce.html
12GIAC GCIH Questions Answers
- Question No 9
- Which of the following protocols is a maintenance
protocol and is normally considered a - part of the IP layer, but has also been used to
conduct denial-of-service attacks? - A. ICMP
- B. L2TP
- C. TCP
- D. NNTP
- Answer A
https//www.vcetests.com/GCIH-vce.html
13GIAC GCIH Questions Answers
- Question No 10
- You want to connect to your friend's computer and
run a Trojan on it. Which of the following - tools will you use to accomplish the task?
- A. PSExec
- B. Remoxec
- C. Hk.exe
- D. GetAdmin.exe
- Answer A
https//www.vcetests.com/GCIH-vce.html
14Why Choose Us?
https//www.vcetests.com/GCIH-vce.html