GIAC GCIH Exam Practice Questions (P. 4)
- Full Access (842 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #31
You want to scan your network quickly to detect live hosts by using ICMP ECHO Requests. What type of scanning will you perform to accomplish the task?
send
light_mode
delete
Question #32
Adam, a malicious hacker is running a scan. Statistics of the scan is as follows:
Scan directed at open port: ClientServer
192.5.2.92:4079 ---------FIN--------->192.5.2.110:23192.5.2.92:4079 <----NO RESPONSE---
---192.5.2.110:23
Scan directed at closed port:
ClientServer -
192.5.2.92:4079 ---------FIN--------->192.5.2.110:23
192.5.2.92:4079<-----RST/ACK----------192.5.2.110:23
Which of the following types of port scan is Adam running?
Scan directed at open port: ClientServer
192.5.2.92:4079 ---------FIN--------->192.5.2.110:23192.5.2.92:4079 <----NO RESPONSE---
---192.5.2.110:23
Scan directed at closed port:
ClientServer -
192.5.2.92:4079 ---------FIN--------->192.5.2.110:23
192.5.2.92:4079<-----RST/ACK----------192.5.2.110:23
Which of the following types of port scan is Adam running?
send
light_mode
delete
Question #33
Which of the following is a network worm that exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system?
- AWin32/Agent
- BWMA/TrojanDownloader.GetCodec
- CWin32/Conflicker
- DWin32/PSW.OnLineGames
Correct Answer:
C
C
send
light_mode
delete
Question #34
Which of the following statements are true about netcat?
Each correct answer represents a complete solution. (Choose all that apply.)
Each correct answer represents a complete solution. (Choose all that apply.)
- AIt provides special tunneling, such as UDP to TCP, with the possibility of specifying all network parameters.
- BIt can be used as a file transfer solution.
- CIt provides outbound and inbound connections for TCP and UDP ports.
- DThe nc -z command can be used to redirect stdin/stdout from a program.
Correct Answer:
ABC
ABC
send
light_mode
delete
Question #35
Which of the following types of attacks is mounted with the objective of causing a negative impact on the performance of a computer or network?
- AVulnerability attack
- BMan-in-the-middle attack
- CDenial-of-Service (DoS) attack
- DImpersonation attack
Correct Answer:
C
C
send
light_mode
delete
Question #36
Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?
send
light_mode
delete
Question #37
Which of the following malicious software travels across computer networks without the assistance of a user?
send
light_mode
delete
Question #38
What is the major difference between a worm and a Trojan horse?
- AA worm spreads via e-mail, while a Trojan horse does not.
- BA worm is a form of malicious program, while a Trojan horse is a utility.
- CA worm is self replicating, while a Trojan horse is not.
- DA Trojan horse is a malicious program, while a worm is an anti-virus software.
Correct Answer:
C
C
send
light_mode
delete
Question #39
Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to test the network security of the company. He created a webpage to discuss the progress of the tests with employees who were interested in following the test. Visitors were allowed to click on a company's icon to mark the progress of the test. Adam successfully embeds a keylogger. He also added some statistics on the webpage. The firewall protects the network well and allows strict Internet access.
How was security compromised and how did the firewall respond?
How was security compromised and how did the firewall respond?
- AThe attack was social engineering and the firewall did not detect it.
- BSecurity was not compromised as the webpage was hosted internally.
- CThe attack was Cross Site Scripting and the firewall blocked it.
- DSecurity was compromised as keylogger is invisible for firewall.
Correct Answer:
A
A
send
light_mode
delete
Question #40
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The company has three Windows 2008 file servers, 150 Windows XP Professional, thirty UNIX-based client computers. The network users have identical user accounts for both Active Directory and the UNIX realm. You want to ensure that the UNIX clients on the network can access the file servers. You also want to ensure that the users are able to access all resources by logging on only once, and that no additional software is installed on the UNIX clients.
What will you do to accomplish this task?
Each correct answer represents a part of the solution. (Choose two.)
What will you do to accomplish this task?
Each correct answer represents a part of the solution. (Choose two.)
- AConfigure a distributed file system (Dfs) on the file server in the network.
- BEnable the Network File System (NFS) component on the file servers in the network.
- CConfigure ADRMS on the file servers in the network.
- DEnable User Name Mapping on the file servers in the network.
Correct Answer:
BD
BD
send
light_mode
delete
All Pages