Pass the GIAC Security Administration GCIH Questions and answers with CertsForce

Viewing page 5 out of 10 pages
Viewing questions 41-50 out of questions
Questions # 41:

What is the major difference between a worm and a Trojan horse?

Options:

A.

A worm spreads via e-mail, while a Trojan horse does not.


B.

A worm is a form of malicious program, while a Trojan horse is a utility.


C.

A worm is self replicating, while a Trojan horse is not.


D.

A Trojan horse is a malicious program, while a worm is an anti-virus software.


Expert Solution
Questions # 42:

Adam works as a Security Analyst for Umbrella Inc. Company has a Windows-based network. All computers run on Windows XP. Manager of the Sales department complains Adam about the unusual behavior of his computer. He told Adam that some pornographic contents are suddenly appeared on his computer overnight. Adam suspects that some malicious software or Trojans have been installed on the computer. He runs some diagnostics programs and Port scanners and found that the Port 12345, 12346, and 20034 are open. Adam also noticed some tampering with the Windows registry, which causes one application to run every time when Windows start.

Which of the following is the most likely reason behind this issue?

Options:

A.

Cheops-ng is installed on the computer.


B.

Elsave is installed on the computer.


C.

NetBus is installed on the computer.


D.

NetStumbler is installed on the computer.


Expert Solution
Questions # 43:

Which of the following tools is an automated tool that is used to implement SQL injections and to retrieve data from Web server databases?

Options:

A.

Fragroute


B.

Absinthe


C.

Stick


D.

ADMutate


Expert Solution
Questions # 44:

Which of the following statements are true about session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Use of a long random number or string as the session key reduces session hijacking.


B.

It is used to slow the working of victim's network resources.


C.

TCP session hijacking is when a hacker takes over a TCP session between two machines.


D.

It is the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system.


Expert Solution
Questions # 45:

Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to secure access to the network of the company from all possible entry points. He segmented the network into several subnets and installed firewalls all over the network. He has placed very stringent rules on all the firewalls, blocking everything in and out except the ports that must be used. He does need to have port 80 open since his company hosts a website that must be accessed from the Internet. Adam is still worried about the programs like Hping2 that can get into a network through covert channels.

Which of the following is the most effective way to protect the network of the company from an attacker using Hping2 to scan his internal network?

Options:

A.

Block all outgoing traffic on port 21


B.

Block all outgoing traffic on port 53


C.

Block ICMP type 13 messages


D.

Block ICMP type 3 messages


Expert Solution
Questions # 46:

Which of the following types of attacks is only intended to make a computer resource unavailable to its users?

Options:

A.

Denial of Service attack


B.

Replay attack


C.

Teardrop attack


D.

Land attack


Expert Solution
Questions # 47:

You want to scan your network quickly to detect live hosts by using ICMP ECHO Requests. What type of scanning will you perform to accomplish the task?

Options:

A.

Idle scan


B.

TCP SYN scan


C.

XMAS scan


D.

Ping sweep scan


Expert Solution
Questions # 48:

Which of the following tools can be used to detect the steganography?

Options:

A.

Dskprobe


B.

Blindside


C.

ImageHide


D.

Snow


Expert Solution
Questions # 49:

Which of the following is spy software that records activity on Macintosh systems via snapshots, keystrokes, and Web site logging?

Options:

A.

Spector


B.

Magic Lantern


C.

eblaster


D.

NetBus


Expert Solution
Questions # 50:

Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?

Options:

A.

Fraggle


B.

Ping flood


C.

Bonk


D.

Smurf


Expert Solution
Viewing page 5 out of 10 pages
Viewing questions 41-50 out of questions