Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GCIH Practice Exam with Questions & Answers | Set: 9

Questions 81

Fill in the blank with the appropriate word.

StackGuard (as used by Immunix), ssp/ProPolice (as used by OpenBSD), and Microsoft's /GS option use ______ defense against buffer overflow attacks.

Options:
GIAC GCIH Premium Access
Questions 82

Adam works as a Security Analyst for Umbrella Inc. Company has a Windows-based network. All computers run on Windows XP. Manager of the Sales department complains Adam about the unusual behavior of his computer. He told Adam that some pornographic contents are suddenly appeared on his computer overnight. Adam suspects that some malicious software or Trojans have been installed on the computer. He runs some diagnostics programs and Port scanners and found that the Port 12345, 12346, and 20034 are open. Adam also noticed some tampering with the Windows registry, which causes one application to run every time when Windows start.

Which of the following is the most likely reason behind this issue?

Options:
A.

Cheops-ng is installed on the computer.

B.

Elsave is installed on the computer.

C.

NetBus is installed on the computer.

D.

NetStumbler is installed on the computer.

Questions 83

Adam, a malicious hacker, wants to perform a reliable scan against a remote target. He is not concerned about being stealth at this point.

Which of the following type of scans would be most accurate and reliable?

Options:
A.

UDP sacn

B.

TCP Connect scan

C.

ACK scan

D.

Fin scan

Questions 84

Which of the following attacks is specially used for cracking a password?

Options:
A.

PING attack

B.

Dictionary attack

C.

Vulnerability attack

D.

DoS attack

Questions 85

Which of the following is designed to protect the Internet resolvers (clients) from forged DNS data created by DNS cache poisoning?

Options:
A.

Stub resolver

B.

BINDER

C.

Split-horizon DNS

D.

Domain Name System Extension (DNSSEC)

Questions 86

In which of the following attacking methods does an attacker distribute incorrect IP address?

Options:
A.

IP spoofing

B.

Mac flooding

C.

DNS poisoning

D.

Man-in-the-middle

Questions 87

Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc. Which of the following types of Cross-Site Scripting attack Ryan intends to do?

Options:
A.

Non persistent

B.

Document Object Model (DOM)

C.

SAX

D.

Persistent

Questions 88

Which of the following applications is an example of a data-sending Trojan?

Options:
A.

SubSeven

B.

Senna Spy Generator

C.

Firekiller 2000

D.

eBlaster

Questions 89

Adam works as an Incident Handler for Umbrella Inc. His recent actions towards the incident are not up to the standard norms of the company. He always forgets some steps and procedures while handling responses as they are very hectic to perform.

Which of the following steps should Adam take to overcome this problem with the least administrative effort?

Options:
A.

Create incident manual read it every time incident occurs.

B.

Appoint someone else to check the procedures.

C.

Create incident checklists.

D.

Create new sub-team to keep check.

Questions 90

Which of the following types of attacks is mounted with the objective of causing a negative impact on the performance of a computer or network?

Options:
A.

Vulnerability attack

B.

Man-in-the-middle attack

C.

Denial-of-Service (DoS) attack

D.

Impersonation attack