Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GCIH - GIAC Certified Incident Handler

Page: 5 / 10
Total 328 questions

Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

A.

Shoulder surfing

B.

File integrity auditing

C.

Reconnaissance

D.

Spoofing

Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes. On the basis of above information, which of the following types of attack is Adam attempting to perform?

A.

Fraggle attack

B.

Ping of death attack

C.

SYN Flood attack

D.

Land attack

Which of the following rootkits is able to load the original operating system as a virtual machine, thereby enabling it to intercept all hardware calls made by the original operating system?

A.

Kernel level rootkit

B.

Boot loader rootkit

C.

Hypervisor rootkit

D.

Library rootkit

Which of the following tools will you use to prevent from session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

A.

OpenSSH

B.

Rlogin

C.

Telnet

D.

SSL

Which of the following programs can be used to detect stealth port scans performed by a malicious hacker?

Each correct answer represents a complete solution. Choose all that apply.

A.

nmap

B.

scanlogd

C.

libnids

D.

portsentry

You are hired as a Database Administrator for Jennifer Shopping Cart Inc. You monitor the server health through the System Monitor and found that there is a sudden increase in the number of logins.

Which of the following types of attack has occurred?

A.

Injection

B.

Virus

C.

Worm

D.

Denial-of-service

Fill in the blank with the appropriate term.

______ is a free Unix subsystem that runs on top of Windows.

Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

A.

Buffer-overflow attack

B.

Shoulder surfing attack

C.

Man-in-the-middle attack

D.

Denial-of-Service (DoS) attack

You discover that your network routers are being flooded with broadcast packets that have the return address of one of the servers on your network. This is resulting in an overwhelming amount of traffic going back to that server and flooding it. What is this called?

A.

Syn flood

B.

Blue jacking

C.

Smurf attack

D.

IP spoofing

In which of the following attacks does the attacker gather information to perform an access attack?

A.

Land attack

B.

Reconnaissance attack

C.

Vulnerability attack

D.

DoS attack