Pass the GIAC Security Administration GCIH Questions and answers with CertsForce

Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions
Questions # 11:

You want to connect to your friend's computer and run a Trojan on it. Which of the following tools will you use to accomplish the task?

Options:

A.

PSExec


B.

Remoxec


C.

Hk.exe


D.

GetAdmin.exe


Expert Solution
Questions # 12:

Which of the following attacks allows an attacker to sniff data frames on a local area network (LAN) or stop the traffic altogether?

Options:

A.

Port scanning


B.

ARP spoofing


C.

Man-in-the-middle


D.

Session hijacking


Expert Solution
Questions # 13:

Which of the following types of skills are required in the members of an incident handling team?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Organizational skills


B.

Diplomatic skills


C.

Methodical skills


D.

Technical skills


Expert Solution
Questions # 14:

Which of the following attacks involves multiple compromised systems to attack a single target?

Options:

A.

Brute force attack


B.

Replay attack


C.

Dictionary attack


D.

DDoS attack


Expert Solution
Questions # 15:

Which of the following types of channels is used by Trojans for communication?

Options:

A.

Loop channel


B.

Open channel


C.

Covert channel


D.

Overt channel


Expert Solution
Questions # 16:

Which of the following ensures that the investigation process of incident response team does not break any laws during the response to an incident?

Options:

A.

Information Security representative


B.

Lead Investigator


C.

Legal representative


D.

Human Resource


Expert Solution
Questions # 17:

You want to add a netbus Trojan in the chess.exe game program so that you can gain remote access to a friend's computer. Which of the following tools will you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Tripwire


B.

Yet Another Binder


C.

Pretator Wrapper


D.

Beast


Expert Solution
Questions # 18:

You are monitoring your network's behavior. You find a sudden increase in traffic on the network. It seems to come in bursts and emanate from one specific machine. You have been able to determine that a user of that machine is unaware of the activity and lacks the computer knowledge required to be responsible for a computer attack. What attack might this indicate?

Options:

A.

Spyware


B.

Ping Flood


C.

Denial of Service


D.

Session Hijacking


Expert Solution
Questions # 19:

Maria works as the Chief Security Officer for PassGuide Inc. She wants to send secret messages to the CEO of the company. To secure these messages, she uses a technique of hiding a secret message within an ordinary message. The technique provides 'security through obscurity'. What technique is Maria using?

Options:

A.

Steganography


B.

Public-key cryptography


C.

RSA algorithm


D.

Encryption


Expert Solution
Questions # 20:

You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling process to handle the events and incidents. You identify Denial of Service attack (DOS) from a network linked to your internal enterprise network. Which of the following phases of the Incident handling process should you follow next to handle this incident?

Options:

A.

Containment


B.

Preparation


C.

Recovery


D.

Identification


Expert Solution
Viewing page 2 out of 10 pages
Viewing questions 11-20 out of questions