September 27, 2024

[May 23, 2022] GCIH Ultimate Study Guide – PrepAwayPDF [Q158-Q176]

5/5 - (1 vote)

[May 23, 2022] GCIH Ultimate Study Guide – PrepAwayPDF

Ultimate Guide to Prepare GCIH Certification Exam for GIAC Information Security in 2022

NO.158 Which of the following methods can be used to detect session hijacking attack?

 
 
 
 

NO.159 Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?

 
 
 
 

NO.160 Which of the following is a network worm that exploits the RPC sub-system vulnerability present in the Microsoft
Windows operating system?

 
 
 
 

NO.161 CORRECT TEXT
Fill in the blank with the appropriate term.
______ is a technique used to make sure that incoming packets are actually from the networks that they claim to be from.

NO.162 Which of the following tools can be used to detect the steganography?

 
 
 
 

NO.163 Which of the following statements are true about worms?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NO.164 In which of the following malicious hacking steps does email tracking come under?

 
 
 
 

NO.165 Which of the following types of attacks slows down or stops a server by overloading it with requests?

 
 
 
 

NO.166 Which of the following types of malware does not replicate itself but can spread only when the circumstances are beneficial?

 
 
 
 

NO.167 You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are
working as a root user on the Linux operating system. Your company is facing an IP spoofing attack. Which of the
following tools will you use to get an alert saying that an upcoming IP packet is being spoofed?

 
 
 
 

NO.168 Which of the following controls is described in the statement given below?
“It ensures that the enforcement of organizational security policy does not rely on voluntary web application user compliance. It secures information by assigning sensitivity labels on information and comparing this to the level of security a user is operating at.”

 
 
 
 

NO.169 In which of the following attacks does an attacker create the IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system?

 
 
 
 

NO.170 Which of the following tools can be used for network sniffing as well as for intercepting conversations through session
hijacking?

 
 
 
 

NO.171 An attacker sends a large number of packets to a target computer that causes denial of service.
Which of the following type of attacks is this?

 
 
 
 

NO.172 Which of the following procedures is designed to enable security personnel to identify, mitigate, and recover from malicious computer incidents, such as unauthorized access to a system or data, denialof-service, or unauthorized changes to system hardware, software, or data?

 
 
 
 

NO.173 Which of the following actions is performed by the netcat command given below?
nc 55555 < /etc/passwd

 
 
 
 

NO.174 In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?

 
 
 
 

NO.175 Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?
Each correct answer represents a complete solution. Choose two.

 
 
 
 

NO.176 As a professional hacker, you want to crack the security of secureserver.com. For this, in the information gathering
step, you performed scanning with the help of nmap utility to retrieve as many different protocols as possible being
used by the secureserver.com so that you could get the accurate knowledge about what services were being used by
the secure server.com. Which of the following nmap switches have you used to accomplish the task?

 
 
 
 

GIAC Information Security Fundamentals-GCIH Exam-Practice-Dumps: https://www.prepawaypdf.com/GIAC/GCIH-practice-exam-dumps.html

Leave a Reply

Your email address will not be published. Required fields are marked *

Enter the text from the image below