This page was exported from Latest Exam Prep [ http://certify.vceprep.com ]
Export date: Sat Sep 21 11:55:44 2024 / +0000 GMT

Verified GCIH dumps Q&As - 2023 Latest GCIH Download [Q123-Q138]




Verified GCIH dumps Q&As - 2023 Latest GCIH Download

Dumps Questions [2023] Pass for GCIH Exam

NO.123 Which of the following is the difference between SSL and S-HTTP?

 
 
 
 

NO.124 You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?

 
 
 
 

NO.125 Which of the following languages are vulnerable to a buffer overflow attack?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NO.126 Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms.
In order to use this tool on the Windows platform a user must install a packet capture library.
What is the name of this library?

 
 
 
 

NO.127 In which of the following attacks does an attacker spoof the source address in IP packets that are sent to the victim?

 
 
 
 

NO.128 Choose and reorder the steps of an incident handling process in their correct order.

NO.129 Which of the following tools can be used for stress testing of a Web server?
Each correct answer represents a complete solution. Choose two.

 
 
 
 

NO.130 SIMULATION
Fill in the blank with the appropriate word.
StackGuard (as used by Immunix), ssp/ProPolice (as used by OpenBSD), and Microsoft’s /GS option use
______ defense against buffer overflow attacks.

NO.131 Which of the following statements about Ping of Death attack is true?

 
 
 
 

NO.132 Which of the following are the limitations for the cross site request forgery (CSRF) attack?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NO.133 Which of the following attacks can be overcome by applying cryptography?

 
 
 
 

NO.134 Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to test the network
security of the company. He created a webpage to discuss the progress of the tests with employees who were
interested in following the test. Visitors were allowed to click on a company’s icon to mark the progress of the test.
Adam successfully embeds a keylogger. He also added some statistics on the webpage. The firewall protects the
network well and allows strict Internet access.
How was security compromised and how did the firewall respond?

 
 
 
 

NO.135 A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as network saturation attack or bandwidth consumption attack. Attackers perform DoS attacks by sending a large number of protocol packets to a network. The problems caused by a DoS attack are as follows:
l Saturation of network resources
l Disruption of connections between two computers, thereby preventing communications between services
l Disruption of services to a specific computer
l Failure to access a Web site l Increase in the amount of spam
Which of the following can be used as countermeasures against DoS attacks?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NO.136 Which of the following functions can be used as a countermeasure to a Shell Injection attack?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

NO.137 Which of the following is the most common vulnerability that can affect desktop applications written in native code?

 
 
 
 

NO.138 Which of the following statements are true about tcp wrappers?
Each correct answer represents a complete solution. Choose all that apply.

 
 
 
 

Updated GIAC Study Guide GCIH Dumps Questions: https://www.vceprep.com/GCIH-latest-vce-prep.html

Post date: 2023-03-10 15:12:11
Post date GMT: 2023-03-10 15:12:11
Post modified date: 2023-03-10 15:12:11
Post modified date GMT: 2023-03-10 15:12:11