Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCIH Practice Exam with Questions & Answers | Set: 2

Questions 11

You work as a Network Administrator for Marioxnet Inc. You have the responsibility of handling two routers with BGP protocol for the enterprise's network. One of the two routers gets flooded with an unexpected number of data packets, while the other router starves with no packets reaching it. Which of the following attacks can be a potential cause of this?

Options:
A.

Packet manipulation

B.

Denial-of-Service

C.

Spoofing

D.

Eavesdropping

GIAC GCIH Premium Access
Questions 12

Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

Options:
A.

Buffer-overflow attack

B.

Shoulder surfing attack

C.

Man-in-the-middle attack

D.

Denial-of-Service (DoS) attack

Questions 13

Fill in the blank with the appropriate name of the rootkit.

A _______ rootkit uses device or platform firmware to create a persistent malware image.

Options:
Questions 14

Adam works as a Penetration Tester for Umbrella Inc. A project has been assigned to him check the security of wireless network of the company. He re-injects a captured wireless packet back onto the network. He does this hundreds of times within a second. The packet is correctly encrypted and Adam assumes it is an ARP request packet. The wireless host responds with a stream of responses, all individually encrypted with different IVs.

Which of the following types of attack is Adam performing?

Options:
A.

Replay attack

B.

MAC Spoofing attack

C.

Caffe Latte attack

D.

Network injection attack

Questions 15

John visits an online shop that stores the IDs and prices of the items to buy in a cookie. After selecting the items that he wants to buy, the attacker changes the price of the item to 1.

Original cookie values:

ItemID1=2

ItemPrice1=900

ItemID2=1

ItemPrice2=200

Modified cookie values:

ItemID1=2

ItemPrice1=1

ItemID2=1

ItemPrice2=1

Now, he clicks the Buy button, and the prices are sent to the server that calculates the total price.

Which of the following hacking techniques is John performing?

Options:
A.

Computer-based social engineering

B.

Man-in-the-middle attack

C.

Cross site scripting

D.

Cookie poisoning

Questions 16

Which of the following is a technique for creating Internet maps?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Active Probing

B.

AS PATH Inference

C.

Object Relational Mapping

D.

Network Quota

Questions 17

Victor wants to send an encrypted message to his friend. He is using certain steganography technique to accomplish this task. He takes a cover object and changes it accordingly to hide information. This secret information is recovered only when the algorithm compares the changed cover with the original cover.

Which of the following Steganography methods is Victor using to accomplish the task?

Options:
A.

The distortion technique

B.

The spread spectrum technique

C.

The substitution technique

D.

The cover generation technique

Questions 18

Which of the following tools can be used as penetration tools in the Information system auditing process?

Each correct answer represents a complete solution. Choose two.

Options:
A.

Nmap

B.

Snort

C.

SARA

D.

Nessus

Questions 19

You enter the netstat -an command in the command prompt and you receive intimation that port number 7777 is open on your computer. Which of the following Trojans may be installed on your computer?

Options:
A.

NetBus

B.

QAZ

C.

Donald Dick

D.

Tini

Questions 20

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

Options:
A.

Identification

B.

Containment

C.

Eradication

D.

Preparation