Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCIH Practice Exam with Questions & Answers | Set: 3

Questions 21

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He has successfully completed the following steps of the pre-attack phase:

l Information gathering

l Determining network range

l Identifying active machines

l Finding open ports and applications

l OS fingerprinting

l Fingerprinting services

Now John wants to perform network mapping of the We-are-secure network. Which of the following tools can he use to accomplish his task?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Ettercap

B.

Traceroute

C.

Cheops

D.

NeoTrace

GIAC GCIH Premium Access
Questions 22

Which of the following can be used to perform session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Cross-site scripting

B.

Session fixation

C.

ARP spoofing

D.

Session sidejacking

Questions 23

Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?

Options:
A.

Kernel keylogger

B.

Software keylogger

C.

Hardware keylogger

D.

OS keylogger

Questions 24

Which of the following statements is true about the difference between worms and Trojan horses?

Options:
A.

Trojan horses are a form of malicious codes while worms are not.

B.

Trojan horses are harmful to computers while worms are not.

C.

Worms can be distributed through emails while Trojan horses cannot.

D.

Worms replicate themselves while Trojan horses do not.

Questions 25

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

Options:
A.

Shoulder surfing

B.

File integrity auditing

C.

Reconnaissance

D.

Spoofing

Questions 26

What is the purpose of configuring a password protected screen saver on a computer?

Options:
A.

For preventing unauthorized access to a system.

B.

For preventing a system from a Denial of Service (DoS) attack.

C.

For preventing a system from a social engineering attack.

D.

For preventing a system from a back door attack.

Questions 27

You work as a Network Penetration tester in the Secure Inc. Your company takes the projects to test the security of various companies. Recently, Secure Inc. has assigned you a project to test the security of a Web site. You go to the Web site login page and you run the following SQL query:

SELECT email, passwd, login_id, full_name

FROM members

WHERE email = 'attacker@somehwere.com'; DROP TABLE members; --'

What task will the above SQL query perform?

Options:
A.

Deletes the database in which members table resides.

B.

Deletes the rows of members table where email id is 'attacker@somehwere.com' given.

C.

Performs the XSS attacks.

D.

Deletes the entire members table.

Questions 28

Which of the following refers to applications or files that are not classified as viruses or Trojan horse programs, but can still negatively affect the performance of the computers on your network and introduce significant security risks to your organization?

Options:
A.

Hardware

B.

Grayware

C.

Firmware

D.

Melissa

Questions 29

In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entire zone file for a domain from a DNS server. The information provided by the DNS zone can help an attacker gather user names, passwords, and other valuable information. To attempt a zone transfer, an attacker must be connected to a DNS server that is the authoritative server for that zone. Besides this, an attacker can launch a Denial of Service attack against the zone's DNS servers by flooding them with a lot of requests. Which of the following tools can an attacker use to perform a DNS zone transfer?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Host

B.

Dig

C.

DSniff

D.

NSLookup

Questions 30

Which of the following types of malware can an antivirus application disable and destroy?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Rootkit

B.

Trojan

C.

Crimeware

D.

Worm

E.

Adware

F.

Virus

Exam Code: GCIH
Certification Provider: GIAC
Exam Name: GIAC Certified Incident Handler
Last Update: Sep 12, 2025
Questions: 328