[Free] 2017(Sep) EnsurePass Dumpsleader GIAC GCIH Dumps with VCE and PDF 201-210

EnsurePass
2017 Sep GIAC Official New Released GCIH
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GCIH.html

GIAC Certified Incident Handler

Question No: 201 – (Topic 3)

Which of the following is the difference between SSL and S-HTTP?

  1. SSL operates at the application layer and S-HTTP operates at the network layer.

  2. SSL operates at the application layer and S-HTTP operates at the transport layer.

  3. SSL operates at the network layer and S-HTTP operates at the application layer.

  4. SSL operates at the transport layer and S-HTTP operates at the application layer.

Answer: D

Question No: 202 CORRECT TEXT – (Topic 3)

Fill in the blank with the correct numeric value. ARP poisoning is achieved in steps.

Answer: 2

Question No: 203 – (Topic 3)

You want to add a netbus Trojan in the chess.exe game program so that you can gain remote access to a friend#39;s computer. Which of the following tools will you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. Tripwire

  2. Yet Another Binder

  3. Pretator Wrapper

  4. Beast

Answer: B,C

Question No: 204 – (Topic 3)

You work as a Senior Marketing Manager for Umbrella Inc. You find out that some of the software applications on the systems were malfunctioning and also you were not able to access your remote desktop session. You suspected that some malicious attack was performed on the network of the company. You immediately called the incident response team to handle the situation who enquired the Network Administrator to acquire all relevant information regarding the malfunctioning. The Network Administrator informed the incident response team that he was reviewing the security of the network which caused all these problems. Incident response team announced that this was a controlled event not an incident.

Which of the following steps of an incident handling process was performed by the incident response team?

  1. Containment

  2. Eradication

  3. Preparation

  4. Identification

Answer: D

Question No: 205 CORRECT TEXT – (Topic 3)

Fill in the blank with the appropriate name of the tool.

scans for rootkits by comparing SHA-1 hashes of important files with known good ones in online database.

Answer: rkhunter

Question No: 206 – (Topic 3)

When you conduct the XMAS scanning using Nmap, you find that most of the ports scanned do not give a response. What can be the state of these ports?

  1. Filtered

  2. Open

  3. Closed

Answer: B

Question No: 207 – (Topic 3)

You execute the following netcat command:

c:\target\nc -1 -p 53 -d -e cmd.exe

What action do you want to perform by issuing the above command?

  1. Listen the incoming data and performing port scanning

  2. Capture data on port 53 and performing banner grabbing

  3. Capture data on port 53 and delete the remote shell

  4. Listen the incoming traffic on port 53 and execute the remote shell

Answer: D

Question No: 208 – (Topic 3)

Adam works as a Security Analyst for Umbrella Inc. CEO of the company ordered him to implement two-factor authentication for the employees to access their networks. He has told him that he would like to use some type of hardware device in tandem with a security or identifying pin number. Adam decides to implement smart cards but they are not cost effective.

Which of the following types of hardware devices will Adam use to implement two-factor authentication?

  1. Biometric device

  2. Security token

  3. Proximity cards

  4. One Time Password

Answer: B

Question No: 209 – (Topic 3)

Jane works as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. Jane is troubleshooting the computer of a user who has installed software that automatically gains full permissions on his computer. Jane has never seen this software before. Which of the following types of malware is the user facing on his computer?

  1. Rootkits

  2. Viruses

  3. Spyware

  4. Adware

Answer: A

Question No: 210 – (Topic 3)

Which of the following applications automatically calculates cryptographic hashes of all key system files that are to be monitored for modifications?

  1. Tripwire

  2. TCPView

  3. PrcView

  4. Inzider

Answer: A

100% Free Download!
Download Free Demo:GCIH Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GCIH Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE