Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GCIH - GIAC Certified Incident Handler

Page: 3 / 10
Total 328 questions

Which of the following is used by attackers to obtain an authenticated connection on a network?

A.

Denial-of-Service (DoS) attack

B.

Replay attack

C.

Man-in-the-middle attack

D.

Back door

You discover that all available network bandwidth is being used by some unknown service. You discover that UDP packets are being used to connect the echo service on one machine to the chargen service on another machine. What kind of attack is this?

A.

Smurf

B.

Denial of Service

C.

Evil Twin

D.

Virus

Which of the following languages are vulnerable to a buffer overflow attack?

Each correct answer represents a complete solution. Choose all that apply.

A.

Java

B.

C++

C.

C

D.

Action script

Which of the following applications automatically calculates cryptographic hashes of all key system files that are to be monitored for modifications?

A.

Tripwire

B.

TCPView

C.

PrcView

D.

Inzider

In which of the following attacks does an attacker use packet sniffing to read network traffic between two parties to steal the session cookie?

A.

Session fixation

B.

Cross-site scripting

C.

Session sidejacking

D.

ARP spoofing

Which of the following steps of incident response is steady in nature?

A.

Containment

B.

Eradication

C.

Preparation

D.

Recovery

Which of the following rootkits adds additional code or replaces portions of an operating system, including both the kernel and associated device drivers?

A.

Hypervisor rootkit

B.

Boot loader rootkit

C.

Kernel level rootkit

D.

Library rootkit

Peter works as a Network Administrator for the PassGuide Inc. The company has a Windows-based network. All client computers run the Windows XP operating system. The employees of the company complain that suddenly all of the client computers have started working slowly. Peter finds that a malicious hacker is attempting to slow down the computers by flooding the network with a large number of requests. Which of the following attacks is being implemented by the malicious hacker?

A.

SQL injection attack

B.

Denial-of-Service (DoS) attack

C.

Man-in-the-middle attack

D.

Buffer overflow attack

Which of the following penetration testing phases involves gathering data from whois, DNS, and network scanning, which helps in mapping a target network and provides valuable information regarding the operating system and applications running on the systems?

A.

Post-attack phase

B.

On-attack phase

C.

Attack phase

D.

Pre-attack phase

Which of the following virus is a script that attaches itself to a file or template?

A.

Boot sector

B.

Trojan horse

C.

Macro virus

D.

E-mail virus