Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GCIH - GIAC Certified Incident Handler

Page: 1 / 10
Total 328 questions

Which of the following refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open?

A.

Spoofing

B.

Hacking

C.

SYN attack

D.

PING attack

Which of the following statements are true regarding SYN flood attack?

A.

The attacker sends a succession of SYN requests to a target system.

B.

SYN flood is a form of Denial-of-Service (DoS) attack.

C.

The attacker sends thousands and thousands of ACK packets to the victim.

D.

SYN cookies provide protection against the SYN flood by eliminating the resources allocated on the target host.

Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganographic file system method to encrypt and hide some secret information. Which of the following disk spaces will he use to store this secret information?

Each correct answer represents a complete solution. Choose all that apply.

A.

Slack space

B.

Hidden partition

C.

Dumb space

D.

Unused Sectors

John works as a Network Administrator for We-are-secure Inc. He finds that TCP port 7597 of the Weare- secure server is open. He suspects that it may be open due to a Trojan installed on the server. He presents a report to the company describing the symptoms of the Trojan. A summary of the report is given below:

Once this Trojan has been installed on the computer, it searches Notpad.exe, renames it Note.com, and then copies itself to the computer as Notepad.exe. Each time Notepad.exe is executed, the Trojan executes and calls the original Notepad to avoid being noticed.

Which of the following Trojans has the symptoms as the one described above?

A.

NetBus

B.

Qaz

C.

eBlaster

D.

SubSeven

You are concerned about rootkits on your network communicating with attackers outside your network. Without using an IDS how can you detect this sort of activity?

A.

By examining your domain controller server logs.

B.

You cannot, you need an IDS.

C.

By examining your firewall logs.

D.

By setting up a DMZ.

Which of the following attacks involves multiple compromised systems to attack a single target?

A.

Brute force attack

B.

Replay attack

C.

Dictionary attack

D.

DDoS attack

Adam, a malicious hacker has successfully gained unauthorized access to the Linux system of Umbrella Inc. Web server of the company runs on Apache. He has downloaded sensitive documents and database files from the computer.

After performing these malicious tasks, Adam finally runs the following command on the Linux command box before disconnecting.

for (( i = 0;i<11;i++ )); do dd if=/dev/random of=/dev/hda && dd if=/dev/zero of=/dev/hda done

Which of the following actions does Adam want to perform by the above command?

A.

Infecting the hard disk with polymorphic virus strings.

B.

Deleting all log files present on the system.

C.

Wiping the contents of the hard disk with zeros.

D.

Making a bit stream copy of the entire hard disk for later download.

Which of the following types of attacks come under the category of hacker attacks?

Each correct answer represents a complete solution. Choose all that apply.

A.

Smurf

B.

IP address spoofing

C.

Teardrop

D.

Password cracking

You work as a System Administrator for Happy World Inc. Your company has a server named uC1 that runs Windows Server 2008. The Windows Server virtualization role service is installed on the uC1 server which hosts one virtual machine that also runs Windows Server 2008. You are required to install a new application on the virtual machine. You need to ensure that in case of a failure of the application installation, you are able to quickly restore the virtual machine to its original state.

Which of the following actions will you perform to accomplish the task?

A.

Use the Virtualization Management Console to save the state of the virtual machine.

B.

Log on to the virtual host and create a new dynamically expanding virtual hard disk.

C.

Use the Virtualization Management Console to create a snapshot of the virtual machine.

D.

Use the Edit Virtual Hard Disk Wizard to copy the virtual hard disk of the virtual machine.

Which of the following is the Web 2.0 programming methodology that is used to create Web pages that are dynamic and interactive?

A.

UML

B.

Ajax

C.

RSS

D.

XML