Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCIH Practice Exam with Questions & Answers | Set: 7

Questions 61

Alice wants to prove her identity to Bob. Bob requests her password as proof of identity, which Alice dutifully provides (possibly after some transformation like a hash function); meanwhile, Eve is eavesdropping the conversation and keeps the password. After the interchange is over, Eve connects to Bob posing as Alice; when asked for a proof of identity, Eve sends Alice's password read from the last session, which Bob accepts. Which of the following attacks is being used by Eve?

Options:
A.

Replay

B.

Firewalking

C.

Session fixation

D.

Cross site scripting

GIAC GCIH Premium Access
Questions 62

Which of the following options scans the networks for vulnerabilities regarding the security of a network?

Options:
A.

System enumerators

B.

Port enumerators

C.

Network enumerators

D.

Vulnerability enumerators

Questions 63

You want to add a netbus Trojan in the chess.exe game program so that you can gain remote access to a friend's computer. Which of the following tools will you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Tripwire

B.

Yet Another Binder

C.

Pretator Wrapper

D.

Beast

Questions 64

Which of the following types of channels is used by Trojans for communication?

Options:
A.

Loop channel

B.

Open channel

C.

Covert channel

D.

Overt channel

Questions 65

Which of the following incident response team members ensures that the policies of the organization are enforced during the incident response?

Options:
A.

Information Security representative

B.

Legal representative

C.

Human Resource

D.

Technical representative

Questions 66

Which of the following tools can be used for network sniffing as well as for intercepting conversations through session hijacking?

Options:
A.

Ethercap

B.

Tripwire

C.

IPChains

D.

Hunt

Questions 67

In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?

Options:
A.

Ping of death

B.

Jolt

C.

Fraggle

D.

Teardrop

Questions 68

You work as a System Engineer for Cyber World Inc. Your company has a single Active Directory domain. All servers in the domain run Windows Server 2008. The Microsoft Hyper-V server role has been installed on one of the servers, namely uC1. uC1 hosts twelve virtual machines. You have been given the task to configure the Shutdown option for uC1, so that each virtual machine shuts down before the main Hyper-V server shuts down. Which of the following actions will you perform to accomplish the task?

Options:
A.

Enable the Shut Down the Guest Operating System option in the Automatic Stop Action Properties on each virtual machine.

B.

Manually shut down each of the guest operating systems before the server shuts down.

C.

Create a batch file to shut down the guest operating system before the server shuts down.

D.

Create a logon script to shut down the guest operating system before the server shuts down.

Questions 69

Fill in the blank with the appropriate term.

_______is the practice of monitoring and potentially restricting the flow of information outbound from one network to another

Options:
Questions 70

An attacker sends a large number of packets to a target computer that causes denial of service.

Which of the following type of attacks is this?

Options:
A.

Spoofing

B.

Snooping

C.

Phishing

D.

Flooding