[May-2022] GCIH Dumps PDF – GCIH Real Exam Questions Answers [Q69-Q92]

Rate this post

[May-2022] GCIH Dumps PDF – GCIH Real Exam Questions Answers

GCIH Dumps 100% Pass Guarantee With Latest Demo

NO.69 Which of the following statements are true about tcp wrappers?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NO.70 You work as a Network Administrator for Marioxnet Inc. You have the responsibility of handling two routers with BGP protocol for the enterprise’s network. One of the two routers gets flooded with an unexpected number of data packets, while the other router starves with no packets reaching it. Which of the following attacks can be a potential cause of this?

 
 
 
 

NO.71 Which of the following US Acts emphasized a “risk-based policy for cost-effective security” and makes mandatory for agency program officials, chief information officers, and inspectors general (IGs) to conduct annual reviews of the agency’s information security program and report the results to Office of Management and Budget?

 
 
 
 

NO.72 Which of the following strategies allows a user to limit access according to unique hardware information supplied by a potential client?

 
 
 
 

NO.73 SIMULATION
Fill in the blank with the appropriate term.
______ is a technique used to make sure that incoming packets are actually from the networks that they claim to be from.

NO.74 Which of the following attacks are examples of Denial-of-service attacks (DoS)?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NO.75 Which of the following tools can be used to detect the steganography?

 
 
 
 

NO.76 John works as a professional Ethical Hacker. He is assigned a project to test the security of www.weare- secure.com. He installs a rootkit on the Linux server of the We-are-secure network. Which of the following statements are true about rootkits?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NO.77 You work as a Network Administrator for Net Perfect Inc. The company has a Windows-based network.
The company uses Check Point SmartDefense to provide security to the network of the company. You use SmartDefense on the HTTP servers of the company to fix the limitation for the maximum number of response headers allowed.
Which of the following attacks will be blocked by defining this limitation?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NO.78 Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which
some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the
task:
1. Smoothening and decreasing contrast by averaging the pixels of the area where significant
color transitions occurs.
2. Reducing noise by adjusting color and averaging pixel value.
3. Sharpening, Rotating, Resampling, and Softening the image.
Which of the following Steganography attacks is Victor using?

 
 
 
 

NO.79 Which of the following applications is NOT used for passive OS fingerprinting?

 
 
 
 

NO.80 Adam works as a sales manager for Umbrella Inc. He wants to download software from the Internet. As the software comes from a site in his untrusted zone, Adam wants to ensure that the downloaded software has not been Trojaned. Which of the following options would indicate the best course of action for Adam?

 
 
 
 

NO.81 Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish
this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered
only when the algorithm compares the changed cover with the original cover. Which of the following Steganography
methods is Victor using to accomplish the task?

 
 
 
 

NO.82 Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?
Each correct answer represents a part of the solution. Choose all that apply.

 
 
 
 

NO.83 Mark works as a Network Administrator for Perfect Inc. The company has both wired and wireless networks. An attacker attempts to keep legitimate users from accessing services that they require. Mark uses IDS/IPS sensors on the wired network to mitigate the attack. Which of the following attacks best describes the attacker’s intentions?

 
 
 
 

NO.84 Adam has installed and configured his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Adam notices that when he uses his wireless connection, the speed is sometimes 16 Mbps and sometimes it is only 8 Mbps or less. Adam connects to the management utility wireless router and finds out that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router’s logs and notices that the unfamiliar machine has the same MAC address as his laptop.
Which of the following attacks has been occurred on the wireless network of Adam?

 
 
 
 

NO.85 Which of the following services CANNOT be performed by the nmap utility?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NO.86 Adam, a malicious hacker has successfully gained unauthorized access to the Linux system of Umbrella Inc.
Web server of the company runs on Apache. He has downloaded sensitive documents and database files from the computer.
After performing these malicious tasks, Adam finally runs the following command on the Linux command box before disconnecting.
for (( i = 0;i<11;i++ )); do dd if=/dev/random of=/dev/hda && dd if=/dev/zero of=/dev/hda done Which of the following actions does Adam want to perform by the above command?

 
 
 
 

NO.87 Adam works as an Incident Handler for Umbrella Inc. He has been sent to the California unit to train the members of the incident response team. As a demo project he asked members of the incident response team to perform the following actions:
Remove the network cable wires.
Isolate the system on a separate VLAN
Use a firewall or access lists to prevent communication into or out of the system.
Change DNS entries to direct traffic away from compromised system
Which of the following steps of the incident handling process includes the above actions?

 
 
 
 

NO.88 Which of the following tools can be used to perform brute force attack on a remote database?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NO.89 Which of the following types of attacks slows down or stops a server by overloading it with requests?

 
 
 
 

NO.90 John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.
Original cookie values:
ItemID1=2
ItemPrice1=900
ItemID2=1
ItemPrice2=200
Modified cookie values:
ItemID1=2
ItemPrice1=1
ItemID2=1
ItemPrice2=1
Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.
Which of the following hacking techniques is John performing?

 
 
 
 

NO.91 Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denialof-service, or unauthorized changes to system hardware, software, or data?

 
 
 
 

NO.92 Adam, a malicious hacker is running a scan. Statistics of the scan is as follows:
Scan directed at open port: ClientServer
192.5.2.92:4079 ———FIN———>192.5.2.110:23192.5.2.92:4079 <—-NO RESPONSE—
—192.5.2.110:23
Scan directed at closed port:
ClientServer
192.5.2.92:4079 ———FIN———>192.5.2.110:23
192.5.2.92:4079<—–RST/ACK———-192.5.2.110:23
Which of the following types of port scan is Adam running?

 
 
 
 

Dumps Real GIAC GCIH Exam Questions [Updated 2022]: https://www.prepawaytest.com/GIAC/GCIH-practice-exam-dumps.html

Leave a Reply

Your email address will not be published. Required fields are marked *

Enter the text from the image below