Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GCIH Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCIH Premium Access

View all detail and faqs for the GCIH exam


817 Students Passed

93% Average Score

92% Same Questions
Viewing page 8 out of 10 pages
Viewing questions 71-80 out of questions
Questions # 71:

Mark works as a Network Administrator for Perfect Inc. The company has both wired and wireless networks. An attacker attempts to keep legitimate users from accessing services that they require. Mark uses IDS/IPS sensors on the wired network to mitigate the attack. Which of the following attacks best describes the attacker's intentions?

Options:

A.

Internal attack

B.

Reconnaissance attack

C.

Land attack

D.

DoS attack

Questions # 72:

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

Options:

A.

Stegdetect Attack

B.

Chosen-Stego Attack

C.

Steg-Only Attack

D.

Active Attacks

Questions # 73:

Fill in the blank with the appropriate name of the attack.

______ takes best advantage of an existing authenticated connection

Options:

Questions # 74:

Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover.

Which of the following Steganography methods is Victor using to accomplish the task?

Options:

A.

The distortion technique

B.

The spread spectrum technique

C.

The substitution technique

D.

The cover generation technique

Questions # 75:

Which of the following tools can be used as penetration tools in the Information system auditing process?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Nmap

B.

Snort

C.

SARA

D.

Nessus

Questions # 76:

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

Options:

A.

Identification

B.

Containment

C.

Eradication

D.

Preparation

Questions # 77:

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

nmap

B.

scanlogd

C.

libnids

D.

portsentry

Questions # 78:

Which of the following tools is used to attack the Digital Watermarking?

Options:

A.

Active Attacks

B.

2Mosaic

C.

Steg-Only Attack

D.

Gifshuffle

Questions # 79:

Which of the following actions is performed by the netcat command given below?

nc 55555 < /etc/passwd

Options:

A.

It changes the /etc/passwd file when connected to the UDP port 55555.

B.

It resets the /etc/passwd file to the UDP port 55555.

C.

It fills the incoming connections to /etc/passwd file.

D.

It grabs the /etc/passwd file when connected to UDP port 55555.

Questions # 80:

Adam, a novice web user, is very conscious about the security. He wants to visit the Web site that is known to have malicious applets and code. Adam always makes use of a basic Web Browser to perform such testing.

Which of the following web browsers can adequately fill this purpose?

Options:

A.

Mozilla Firefox

B.

Internet explorer

C.

Lynx

D.

Safari

Viewing page 8 out of 10 pages
Viewing questions 71-80 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.