Pass the GIAC Security Administration GCIH Questions and answers with CertsForce

Viewing page 10 out of 10 pages
Viewing questions 91-100 out of questions
Questions # 91:

Fill in the blank with the appropriate term.

______ is a free Unix subsystem that runs on top of Windows.


Expert Solution
Questions # 92:

Which of the following statements are true about Dsniff?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It contains Trojans.


B.

It is a virus.


C.

It is antivirus.


D.

It is a collection of various hacking tools.


Expert Solution
Questions # 93:

Which of the following types of malware can an antivirus application disable and destroy?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Rootkit


B.

Trojan


C.

Crimeware


D.

Worm


E.

Adware


F.

Virus


Expert Solution
Questions # 94:

Which of the following services CANNOT be performed by the nmap utility?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Passive OS fingerprinting


B.

Sniffing


C.

Active OS fingerprinting


D.

Port scanning


Expert Solution
Questions # 95:

You want to integrate the Nikto tool with nessus vulnerability scanner. Which of the following steps will you take to accomplish the task?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Place nikto.pl file in the /etc/nessus directory.


B.

Place nikto.pl file in the /var/www directory.


C.

Place the directory containing nikto.pl in root's PATH environment variable.


D.

Restart nessusd service.


Expert Solution
Questions # 96:

In which of the following attacks does an attacker spoof the source address in IP packets that are sent to the victim?

Options:

A.

Dos


B.

DDoS


C.

Backscatter


D.

SQL injection


Expert Solution
Questions # 97:

Which of the following are countermeasures to prevent unauthorized database access attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Session encryption


B.

Removing all stored procedures


C.

Applying strong firewall rules


D.

Input sanitization


Expert Solution
Questions # 98:

Which of the following types of malware does not replicate itself but can spread only when the circumstances are beneficial?

Options:

A.

Mass mailer


B.

Worm


C.

Blended threat


D.

Trojan horse


Expert Solution
Viewing page 10 out of 10 pages
Viewing questions 91-100 out of questions