Pass the GIAC Security Administration GCIH Questions and answers with CertsForce

Viewing page 1 out of 10 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following statements about threats are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

A threat is a weakness or lack of safeguard that can be exploited by vulnerability, thus causing harm to the information systems or networks.


B.

A threat is a potential for violation of security which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.


C.

A threat is a sequence of circumstances and events that allows a human or other agent to cause an information-related misfortune by exploiting vulnerability in an IT product.


D.

A threat is any circumstance or event with the potential of causing harm to a system in the form of destruction, disclosure, modification of data, or denial of service.


Expert Solution
Questions # 2:

You want to measure the number of heaps used and overflows occurred at a point in time. Which of the following commands will you run to activate the appropriate monitor?

Options:

A.

UPDATE DBM CONFIGURATION USING DFT_MON_TABLE


B.

UPDATE DBM CONFIGURATION DFT_MON_TIMESTAMP


C.

UPDATE DBM CONFIGURATION USING DFT_MON_BUFPOOL


D.

UPDATE DBM CONFIGURATION USING DFT_MON_SORT


Expert Solution
Questions # 3:

Which of the following attacks saturates network resources and disrupts services to a specific computer?

Options:

A.

Replay attack


B.

Teardrop attack


C.

Denial-of-Service (DoS) attack


D.

Polymorphic shell code attack


Expert Solution
Questions # 4:

Which of the following statements are correct about spoofing and session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Spoofing is an attack in which an attacker can spoof the IP address or other identity of the target and the valid user cannot be active.


B.

Spoofing is an attack in which an attacker can spoof the IP address or other identity of the target but the valid user can be active.


C.

Session hijacking is an attack in which an attacker takes over the session, and the valid user's session is disconnected.


D.

Session hijacking is an attack in which an attacker takes over the session, and the valid user's session is not disconnected.


Expert Solution
Questions # 5:

A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as network saturation attack or bandwidth consumption attack. Attackers perform DoS attacks by sending a large number of protocol packets to a network. The problems caused by a DoS attack are as follows:

l Saturation of network resources

l Disruption of connections between two computers, thereby preventing communications between services

l Disruption of services to a specific computer

l Failure to access a Web site

l Increase in the amount of spam

Which of the following can be used as countermeasures against DoS attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Blocking undesired IP addresses


B.

Applying router filtering


C.

Disabling unneeded network services


D.

Permitting network access only to desired traffic


Expert Solution
Questions # 6:

You enter the following URL on your Web browser:

http://www.we-are-secure.com/scripts/..%co%af../..%co%

af../windows/system32/cmd.exe?/c+dir+c:\

What kind of attack are you performing?

Options:

A.

Directory traversal


B.

Replay


C.

Session hijacking


D.

URL obfuscating


Expert Solution
Questions # 7:

Which of the following incident response team members ensures that the policies of the organization are enforced during the incident response?

Options:

A.

Information Security representative


B.

Legal representative


C.

Human Resource


D.

Technical representative


Expert Solution
Questions # 8:

Which of the following types of scan does not open a full TCP connection?

Options:

A.

FIN scan


B.

ACK scan


C.

Stealth scan


D.

Idle scan


Expert Solution
Questions # 9:

Which of the following threats is a combination of worm, virus, and Trojan horse characteristics?

Options:

A.

Spyware


B.

Heuristic


C.

Blended


D.

Rootkits


Expert Solution
Questions # 10:

Which of the following is an Internet mapping technique that relies on various BGP collectors that collect information such as routing updates and tables and provide this information publicly?

Options:

A.

AS Route Inference


B.

Path MTU discovery (PMTUD)


C.

AS PATH Inference


D.

Firewalking


Expert Solution
Viewing page 1 out of 10 pages
Viewing questions 1-10 out of questions