[Free] 2017(Sep) EnsurePass Dumpsleader GIAC GCIH Dumps with VCE and PDF 181-190

EnsurePass
2017 Sep GIAC Official New Released GCIH
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCIH.html

GIAC Certified Incident Handler

Question No: 181 – (Topic 2)

Mark works as a Network Administrator for NetTech Inc. The network has 150 Windows 2000 Professional client computers and four Windows 2000 servers. All the client computers are able to connect to the Internet. Mark is concerned about malware infecting the client computers through the Internet. What will Mark do to protect the client computers from malware?

Each correct answer represents a complete solution. Choose two.

  1. Educate users of the client computers to avoid malware.

  2. Educate users of the client computers about the problems arising due to malware.

  3. Prevent users of the client computers from executing any programs.

  4. Assign Read-Only permission to the users for accessing the hard disk drives of the client computers.

Answer: A,B

Question No: 182 – (Topic 2)

Adam, a malicious hacker is sniffing the network to inject ARP packets. He injects broadcast frames onto the wire to conduct Man-in-The-Middle attack.

Which of the following is the destination MAC address of a broadcast frame?

A. 0xDDDDDDDDD

B. 0x00000000000

  1. 0xFFFFFFFFFFFF

  2. 0xAAAAAAAAAA

Answer: C

Question No: 183 – (Topic 2)

Which of the following rootkits is used to attack against full disk encryption systems?

  1. Boot loader rootkit

  2. Library rootkit

  3. Hypervisor rootkit

  4. Kernel level rootkit

Answer: A

Question No: 184 – (Topic 2)

Which of the following rootkits patches, hooks, or replaces system calls with versions that hide information about the attacker?

  1. Library rootkit

  2. Kernel level rootkit

  3. Hypervisor rootkit

  4. Boot loader rootkit

Answer: A

Question No: 185 – (Topic 2)

Which of the following tools uses common UNIX/Linux tools like the strings and grep commands to search core system programs for signatures of the rootkits?

  1. rkhunter

  2. OSSEC

  3. chkrootkit

  4. Blue Pill

Answer: C

Question No: 186 – (Topic 2)

You are an Incident manager in Orangesect.Inc. You have been tasked to set up a new extension of your enterprise. The networking, to be done in the new extension, requires different types of cables and an appropriate policy that will be decided by you. Which of the following stages in the Incident handling process involves your decision making?

  1. Identification

  2. Containment

  3. Eradication

  4. Preparation

Answer: D

Question No: 187 – (Topic 2)

Which of the following netcat parameters makes netcat a listener that automatically restarts itself when a connection is dropped?

  1. -u

  2. -l

  3. -p

  4. -L

Answer: D

Question No: 188 CORRECT TEXT – (Topic 2)

Fill in the blank with the appropriate term.

is a free Unix subsystem that runs on top of Windows.

Answer: Cygwin

Question No: 189 – (Topic 2)

Which of the following techniques is used when a system performs the penetration testing

with the objective of accessing unauthorized information residing inside a computer?

  1. Van Eck Phreaking

  2. Phreaking

  3. Biometrician

  4. Port scanning

Answer: D

Question No: 190 – (Topic 2)

You work as a Network Penetration tester in the Secure Inc. Your company takes the projects to test the security of various companies. Recently, Secure Inc. has assigned you a project to test the security of a Web site. You go to the Web site login page and you run the following SQL query:

SELECT email, passwd, login_id, full_name FROM members

WHERE email = #39;attacker@somehwere.com#39;; DROP TABLE members; -#39;

What task will the above SQL query perform?

  1. Deletes the database in which members table resides.

  2. Deletes the rows of members table where email id is #39;attacker@somehwere.com#39; given.

  3. Performs the XSS attacks.

  4. Deletes the entire members table.

Answer: D

100% Free Download!
Download Free Demo:GCIH Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GCIH Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE