Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCIH Practice Exam with Questions & Answers | Set: 4

Questions 31

In which of the following attacks does the attacker gather information to perform an access attack?

Options:
A.

Land attack

B.

Reconnaissance attack

C.

Vulnerability attack

D.

DoS attack

GIAC GCIH Premium Access
Questions 32

Which of the following rootkits is able to load the original operating system as a virtual machine, thereby enabling it to intercept all hardware calls made by the original operating system?

Options:
A.

Kernel level rootkit

B.

Boot loader rootkit

C.

Hypervisor rootkit

D.

Library rootkit

Questions 33

Which of the following netcat parameters makes netcat a listener that automatically restarts itself when a connection is dropped?

Options:
A.

-u

B.

-l

C.

-p

D.

-L

Questions 34

Which of the following tools are used as a network traffic monitoring tool in the Linux operating system?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Netbus

B.

IPTraf

C.

MRTG

D.

Ntop

Questions 35

Which of the following is used to gather information about a remote network protected by a firewall?

Options:
A.

Warchalking

B.

Wardialing

C.

Firechalking

D.

Firewalking

Questions 36

Which of the following types of scan does not open a full TCP connection?

Options:
A.

FIN scan

B.

ACK scan

C.

Stealth scan

D.

Idle scan

Questions 37

John works as an Ethical Hacker for PassGuide Inc. He wants to find out the ports that are open in PassGuide's server using a port scanner. However, he does not want to establish a full TCP connection.

Which of the following scanning techniques will he use to accomplish this task?

Options:
A.

TCP FIN

B.

TCP SYN/ACK

C.

TCP SYN

D.

Xmas tree

Questions 38

Adam works as an Incident Handler for Umbrella Inc. He is informed by the senior authorities that the server of the marketing department has been affected by a malicious hacking attack. Supervisors are also claiming that some sensitive data are also stolen.

Adam immediately arrived to the server room of the marketing department and identified the event as an incident. He isolated the infected network from the remaining part of the network and started preparing to image the entire system. He captures volatile data, such as running process, ram, and network connections.

Which of the following steps of the incident handling process is being performed by Adam?

Options:
A.

Recovery

B.

Eradication

C.

Identification

D.

Containment

Questions 39

Adam works as a Security Administrator for Umbrella Technology Inc. He reported a breach in security to his senior members, stating that "security defenses has been breached and exploited for 2 weeks by hackers." The hackers had accessed and downloaded 50,000 addresses containing customer credit cards and passwords. Umbrella Technology was looking to law enforcement officials to protect their intellectual property.

The intruder entered through an employee's home machine, which was connected to Umbrella Technology's corporate VPN network. The application called BEAST Trojan was used in the attack to open a "back door" allowing the hackers undetected access. The security breach was discovered when customers complained about the usage of their credit cards without their knowledge.

The hackers were traced back to Shanghai, China through e-mail address evidence. The credit card information was sent to that same e-mail address. The passwords allowed the hackers to access Umbrella Technology's network from a remote location, posing as employees.

Which of the following actions can Adam perform to prevent such attacks from occurring in future?

Options:
A.

Allow VPN access but replace the standard authentication with biometric authentication

B.

Replace the VPN access with dial-up modem access to the company's network

C.

Disable VPN access to all employees of the company from home machines

D.

Apply different security policy to make passwords of employees more complex

Questions 40

Which of the following threats is a combination of worm, virus, and Trojan horse characteristics?

Options:
A.

Spyware

B.

Heuristic

C.

Blended

D.

Rootkits

Exam Code: GCIH
Certification Provider: GIAC
Exam Name: GIAC Certified Incident Handler
Last Update: Sep 12, 2025
Questions: 328