GIAC GCIH Exam Practice Questions (P. 2)
- Full Access (842 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #11
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He finds that the We-are- secure server is vulnerable to attacks. As a countermeasure, he suggests that the Network Administrator should remove the IPP printing capability from the server. He is suggesting this as a countermeasure against __________.
- AIIS buffer overflow
- BNetBIOS NULL session
- CSNMP enumeration
- DDNS zone transfer
Correct Answer:
A
A
send
light_mode
delete
Question #12
Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected
Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc. Which of the following types of Cross-Site
Scripting attack Ryan intends to do?
Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc. Which of the following types of Cross-Site
Scripting attack Ryan intends to do?
send
light_mode
delete
Question #13
Which of the following applications is an example of a data-sending Trojan?
send
light_mode
delete
Question #14
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. On the We-are-secure login page, he enters ='or''=' as a username and successfully logs in to the user page of the Web site.
The we-are-secure login page is vulnerable to a __________.
The we-are-secure login page is vulnerable to a __________.
send
light_mode
delete
Question #15
Which of the following statements are true about worms?
Each correct answer represents a complete solution. (Choose all that apply.)
Each correct answer represents a complete solution. (Choose all that apply.)
- AWorms cause harm to the network by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
- BWorms can exist inside files such as Word or Excel documents.
- COne feature of worms is keystroke logging.
- DWorms replicate themselves from one system to another without using a host file.
Correct Answer:
ABD
ABD
send
light_mode
delete
Question #16
Adam works as a Security Analyst for Umbrella Inc. Company has a Windows-based network. All computers run on Windows XP. Manager of the Sales department complains Adam about the unusual behavior of his computer. He told Adam that some pornographic contents are suddenly appeared on his computer overnight. Adam suspects that some malicious software or Trojans have been installed on the computer. He runs some diagnostics programs and Port scanners and found that the Port 12345, 12346, and 20034 are open. Adam also noticed some tampering with the Windows registry, which causes one application to run every time when Windows start.
Which of the following is the most likely reason behind this issue?
Which of the following is the most likely reason behind this issue?
- ACheops-ng is installed on the computer.
- BElsave is installed on the computer.
- CNetBus is installed on the computer.
- DNetStumbler is installed on the computer.
Correct Answer:
C
C
send
light_mode
delete
Question #17
Buffer overflows are one of the major errors used for exploitation on the Internet today. A buffer overflow occurs when a particular operation/function writes more data into a variable than the variable was designed to hold.
Which of the following are the two popular types of buffer overflows?
Each correct answer represents a complete solution. (Choose two.)
Which of the following are the two popular types of buffer overflows?
Each correct answer represents a complete solution. (Choose two.)
- ADynamic buffer overflows
- BStack based buffer overflow
- CHeap based buffer overflow
- DStatic buffer overflows
Correct Answer:
BC
BC
send
light_mode
delete
Question #18
Which of the following are the primary goals of the incident handling team?
Each correct answer represents a complete solution. (Choose all that apply.)
Each correct answer represents a complete solution. (Choose all that apply.)
- AFreeze the scene.
- BRepair any damage caused by an incident.
- CPrevent any further damage.
- DInform higher authorities.
Correct Answer:
ABC
ABC
send
light_mode
delete
Question #19
FILL BLANK -
Fill in the blank with the appropriate word.
StackGuard (as used by Immunix), ssp/ProPolice (as used by OpenBSD), and Microsoft's /GS option use ______ defense against buffer overflow attacks.
Fill in the blank with the appropriate word.
StackGuard (as used by Immunix), ssp/ProPolice (as used by OpenBSD), and Microsoft's /GS option use ______ defense against buffer overflow attacks.
send
light_mode
delete
Question #20
Which of the following tools is used for vulnerability scanning and calls Hydra to launch a dictionary attack?
send
light_mode
delete
All Pages