Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GCIH Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCIH Premium Access

View all detail and faqs for the GCIH exam


817 Students Passed

93% Average Score

92% Same Questions
Viewing page 4 out of 10 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following functions can be used as a countermeasure to a Shell Injection attack?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

escapeshellarg()

B.

mysql_real_escape_string()

C.

regenerateid()

D.

escapeshellcmd()

Questions # 32:

Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?

Options:

A.

Fraggle

B.

Ping flood

C.

Bonk

D.

Smurf

Questions # 33:

Which of the following is a technique of using a modem to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for computers, Bulletin board systems, and fax machines?

Options:

A.

Demon dialing

B.

Warkitting

C.

War driving

D.

Wardialing

Questions # 34:

In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?

Options:

A.

Session fixation

B.

Cross-site scripting

C.

Session sidejacking

D.

ARP spoofing

Questions # 35:

Which of the following types of scan does not open a full TCP connection?

Options:

A.

FIN scan

B.

ACK scan

C.

Stealth scan

D.

Idle scan

Questions # 36:

Which of the following statements about buffer overflow are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It is a situation that occurs when a storage device runs out of space.

B.

It is a situation that occurs when an application receives more data than it is configured to accept.

C.

It can improve application performance.

D.

It can terminate an application.

Questions # 37:

You work as a System Administrator for Happy World Inc. Your company has a server named uC1 that runs Windows Server 2008. The Windows Server virtualization role service is installed on the uC1 server which hosts one virtual machine that also runs Windows Server 2008. You are required to install a new application on the virtual machine. You need to ensure that in case of a failure of the application installation, you are able to quickly restore the virtual machine to its original state.

Which of the following actions will you perform to accomplish the task?

Options:

A.

Use the Virtualization Management Console to save the state of the virtual machine.

B.

Log on to the virtual host and create a new dynamically expanding virtual hard disk.

C.

Use the Virtualization Management Console to create a snapshot of the virtual machine.

D.

Use the Edit Virtual Hard Disk Wizard to copy the virtual hard disk of the virtual machine.

Questions # 38:

Jane works as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. Jane is troubleshooting the computer of a user who has installed software that automatically gains full permissions on his computer. Jane has never seen this software before. Which of the following types of malware is the user facing on his computer?

Options:

A.

Rootkits

B.

Viruses

C.

Spyware

D.

Adware

Questions # 39:

Which of the following protocol loggers is used to detect ping sweep?

Options:

A.

lppi

B.

pitl

C.

dpsl

D.

ippl

Questions # 40:

Which of the following applications is NOT used for passive OS fingerprinting?

Options:

A.

Networkminer

B.

Satori

C.

p0f

D.

Nmap

Viewing page 4 out of 10 pages
Viewing questions 31-40 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.