Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Security Administration GCIH Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GCIH Premium Access

View all detail and faqs for the GCIH exam


817 Students Passed

93% Average Score

92% Same Questions
Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions
Questions # 81:

You work as a Network Penetration tester in the Secure Inc. Your company takes the projects to test the security of various companies. Recently, Secure Inc. has assigned you a project to test the security of a Web site. You go to the Web site login page and you run the following SQL query:

SELECT email, passwd, login_id, full_name

FROM members

WHERE email = 'attacker@somehwere.com'; DROP TABLE members; --'

What task will the above SQL query perform?

Options:

A.

Deletes the database in which members table resides.

B.

Deletes the rows of members table where email id is 'attacker@somehwere.com' given.

C.

Performs the XSS attacks.

D.

Deletes the entire members table.

Questions # 82:

Mark works as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company uses Check Point SmartDefense to provide security to the network. Mark uses SmartDefense on the HTTP servers of the company to fix the limitation for the maximum response header length. Which of the following attacks can be blocked by defining this limitation?

Options:

A.

HTR Overflow worms and mutations

B.

Ramen worm attack

C.

Melissa virus attack

D.

Shoulder surfing attack

Questions # 83:

Adam works as a Security Administrator for the Umbrella Inc. A project has been assigned to him to strengthen the security policies of the company, including its password policies. However, due to some old applications, Adam is only able to enforce a password group policy in Active Directory with a minimum of 10 characters. He informed the employees of the company, that the new password policy requires that everyone must have complex passwords with at least 14 characters. Adam wants to ensure that everyone is using complex passwords that meet the new security policy requirements. He logged on to one of the network's domain controllers and runs the following command:

Question # 83

Which of the following actions will this command take?

Options:

A.

Dumps the SAM password hashes to pwd.txt

B.

Dumps the SAM password file to pwd.txt

C.

Dumps the Active Directory password hashes to pwd.txt

D.

The password history file is transferred to pwd.txt

Questions # 84:

James works as a Database Administrator for Techsoft Inc. The company has a SQL Server 2005 computer. The computer has a database named Sales. Users complain that the performance of the database has deteriorated. James opens the System Monitor tool and finds that there is an increase in network traffic. What kind of attack might be the cause of the performance deterioration?

Options:

A.

Denial-of-Service

B.

Injection

C.

Internal attack

D.

Virus

Questions # 85:

You work as a System Administrator in SunSoft Inc. You are running a virtual machine on Windows Server 2003. The virtual machine is protected by DPM. Now, you want to move the virtual machine to another host. Which of the following steps can you use to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Remove the original virtual machine from the old server and stop the protection for the original virtual machine.

B.

Run consistency check.

C.

Add the copied virtual machine to a protection group.

D.

Copy the virtual machine to the new server.

Questions # 86:

Fill in the blank with the appropriate name of the rootkit.

A _______ rootkit uses device or platform firmware to create a persistent malware image.

Options:

Questions # 87:

Your friend plans to install a Trojan on your computer. He knows that if he gives you a new version of chess.exe, you will definitely install the game on your computer. He picks up a Trojan and joins it with chess.exe. Which of the following tools are required in such a scenario?

Each correct answer represents a part of the solution. Choose three.

Options:

A.

NetBus

B.

Absinthe

C.

Yet Another Binder

D.

Chess.exe

Questions # 88:

Which of the following is a type of computer security vulnerability typically found in Web applications that allow code injection by malicious Web users into the Web pages viewed by other users?

Options:

A.

SID filtering

B.

Cookie poisoning

C.

Cross-site scripting

D.

Privilege Escalation

Questions # 89:

Firekiller 2000 is an example of a __________.

Options:

A.

Security software disabler Trojan

B.

DoS attack Trojan

C.

Data sending Trojan

D.

Remote access Trojan

Questions # 90:

Which of the following can be used to perform session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Cross-site scripting

B.

Session fixation

C.

ARP spoofing

D.

Session sidejacking

Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.