Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GCIH Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCIH Premium Access

View all detail and faqs for the GCIH exam


817 Students Passed

93% Average Score

92% Same Questions
Viewing page 6 out of 10 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?

Options:

A.

Signature-based IDS

B.

Network-based IDS

C.

Passive IDS

D.

Active IDS

Questions # 52:

Which of the following wireless network security solutions refers to an authentication process in which a user can connect wireless access points to a centralized server to ensure that all hosts are properly authenticated?

Options:

A.

Remote Authentication Dial-In User Service (RADIUS)

B.

IEEE 802.1x

C.

Wired Equivalent Privacy (WEP)

D.

Wi-Fi Protected Access 2 (WPA2)

Questions # 53:

Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to perform hacking. Which of the following steps is NOT included in the hacking process?

Options:

A.

Scanning

B.

Preparation

C.

gaining access

D.

Reconnaissance

Questions # 54:

Which of the following is the most common vulnerability that can affect desktop applications written in native code?

Options:

A.

SpyWare

B.

DDoS attack

C.

Malware

D.

Buffer overflow

Questions # 55:

You discover that all available network bandwidth is being used by some unknown service. You discover that UDP packets are being used to connect the echo service on one machine to the chargen service on another machine. What kind of attack is this?

Options:

A.

Smurf

B.

Denial of Service

C.

Evil Twin

D.

Virus

Questions # 56:

Which of the following is the Web 2.0 programming methodology that is used to create Web pages that are dynamic and interactive?

Options:

A.

UML

B.

Ajax

C.

RSS

D.

XML

Questions # 57:

You want to measure the number of heaps used and overflows occurred at a point in time. Which of the following commands will you run to activate the appropriate monitor?

Options:

A.

UPDATE DBM CONFIGURATION USING DFT_MON_TABLE

B.

UPDATE DBM CONFIGURATION DFT_MON_TIMESTAMP

C.

UPDATE DBM CONFIGURATION USING DFT_MON_BUFPOOL

D.

UPDATE DBM CONFIGURATION USING DFT_MON_SORT

Questions # 58:

Which of the following attacks saturates network resources and disrupts services to a specific computer?

Options:

A.

Replay attack

B.

Teardrop attack

C.

Denial-of-Service (DoS) attack

D.

Polymorphic shell code attack

Questions # 59:

TCP/IP stack fingerprinting is the passive collection of configuration attributes from a remote device during standard layer 4 network communications. The combination of parameters may then be used to infer the remote operating system (OS fingerprinting), or incorporated into a device fingerprint.

Which of the following Nmap switches can be used to perform TCP/IP stack fingerprinting?

Options:

A.

nmap -sS

B.

nmap -sU -p

C.

nmap -O -p

D.

nmap -sT

Questions # 60:

Which of the following Linux rootkits allows an attacker to hide files, processes, and network connections?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Phalanx2

B.

Beastkit

C.

Adore

D.

Knark

Viewing page 6 out of 10 pages
Viewing questions 51-60 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.