Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GCIH Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCIH Premium Access

View all detail and faqs for the GCIH exam


817 Students Passed

93% Average Score

92% Same Questions
Viewing page 5 out of 10 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which of the following is the difference between SSL and S-HTTP?

Options:

A.

SSL operates at the application layer and S-HTTP operates at the network layer.

B.

SSL operates at the application layer and S-HTTP operates at the transport layer.

C.

SSL operates at the network layer and S-HTTP operates at the application layer.

D.

SSL operates at the transport layer and S-HTTP operates at the application layer.

Questions # 42:

Which of the following describes network traffic that originates from the inside of a network perimeter and progresses towards the outside?

Options:

A.

Ingress network

B.

Inwards network

C.

Egress network

D.

Outwards network

Questions # 43:

John is a malicious attacker. He illegally accesses the server of We-are-secure Inc. He then places a backdoor in the We-are-secure server and alters its log files. Which of the following steps of malicious hacking includes altering the server log files?

Options:

A.

Maintaining access

B.

Covering tracks

C.

Gaining access

D.

Reconnaissance

Questions # 44:

Which of the following virus is a script that attaches itself to a file or template?

Options:

A.

Boot sector

B.

Trojan horse

C.

Macro virus

D.

E-mail virus

Questions # 45:

Which of the following IP packet elements is responsible for authentication while using IPSec?

Options:

A.

Authentication Header (AH)

B.

Layer 2 Tunneling Protocol (L2TP)

C.

Internet Key Exchange (IKE)

D.

Encapsulating Security Payload (ESP)

Questions # 46:

Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Slack space

B.

Hidden partition

C.

Dumb space

D.

Unused Sectors

Questions # 47:

Which of the following ensures that the investigation process of incident response team does not break any laws during the response to an incident?

Options:

A.

Information Security representative

B.

Lead Investigator

C.

Legal representative

D.

Human Resource

Questions # 48:

You have forgotten your password of an online shop. The web application of that online shop asks you to enter your email so that they can send you a new password. You enter your email

you@gmail.com

And press the submit button.

The Web application displays the server error. What can be the reason of the error?

Options:

A.

You have entered any special character in email.

B.

Email entered is not valid.

C.

The remote server is down.

D.

Your internet connection is slow.

Questions # 49:

Which of the following is the method of hiding data within another media type such as graphic or document?

Options:

A.

Spoofing

B.

Steganography

C.

Packet sniffing

D.

Cryptanalysis

Questions # 50:

Which of the following statements are correct about spoofing and session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Spoofing is an attack in which an attacker can spoof the IP address or other identity of the target and the valid user cannot be active.

B.

Spoofing is an attack in which an attacker can spoof the IP address or other identity of the target but the valid user can be active.

C.

Session hijacking is an attack in which an attacker takes over the session, and the valid user's session is disconnected.

D.

Session hijacking is an attack in which an attacker takes over the session, and the valid user's session is not disconnected.

Viewing page 5 out of 10 pages
Viewing questions 41-50 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.