Pass the GIAC Security Administration GCIH Questions and answers with CertsForce

Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions
Questions # 61:

In which of the following attacking methods does an attacker distribute incorrect IP address?

Options:

A.

IP spoofing


B.

Mac flooding


C.

DNS poisoning


D.

Man-in-the-middle


Expert Solution
Questions # 62:

Which of the following takes control of a session between a server and a client using TELNET, FTP, or any other non-encrypted TCP/IP utility?

Options:

A.

Dictionary attack


B.

Session Hijacking


C.

Trojan horse


D.

Social Engineering


Expert Solution
Questions # 63:

Network mapping provides a security testing team with a blueprint of the organization. Which of the following steps is NOT a part of manual network mapping?

Options:

A.

Gathering private and public IP addresses


B.

Collecting employees information


C.

Banner grabbing


D.

Performing Neotracerouting


Expert Solution
Questions # 64:

You check performance logs and note that there has been a recent dramatic increase in the amount of broadcast traffic. What is this most likely to be an indicator of?

Options:

A.

Virus


B.

Syn flood


C.

Misconfigured router


D.

DoS attack


Expert Solution
Questions # 65:

John, a part-time hacker, has accessed in unauthorized way to the www.yourbank.com banking Website and stolen the bank account information of its users and their credit card numbers by using the SQL injection attack. Now, John wants to sell this information to malicious person Mark and make a deal to get a good amount of money. Since, he does not want to send the hacked information in the clear text format to Mark; he decides to send information in hidden text. For this, he takes a steganography tool and hides the information in ASCII text by appending whitespace to the end of lines and encrypts the hidden information by using the IDEA encryption algorithm. Which of the following tools is John using for steganography?

Options:

A.

Image Hide


B.

2Mosaic


C.

Snow.exe


D.

Netcat


Expert Solution
Questions # 66:

An attacker sends a large number of packets to a target computer that causes denial of service.

Which of the following type of attacks is this?

Options:

A.

Spoofing


B.

Snooping


C.

Phishing


D.

Flooding


Expert Solution
Questions # 67:

Which of the following nmap command parameters is used for TCP SYN port scanning?

Options:

A.

-sF


B.

-sU


C.

-sX


D.

-sS


Expert Solution
Questions # 68:

What is the purpose of configuring a password protected screen saver on a computer?

Options:

A.

For preventing unauthorized access to a system.


B.

For preventing a system from a Denial of Service (DoS) attack.


C.

For preventing a system from a social engineering attack.


D.

For preventing a system from a back door attack.


Expert Solution
Questions # 69:

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following measures would be most helpful in defending against a Denial-of-Service (DoS) attack?

Options:

A.

Implement network based antivirus.


B.

Place a honey pot in the DMZ.


C.

Shorten the timeout for connection attempts.


D.

Implement a strong password policy.


Expert Solution
Questions # 70:

You send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024 using hping2 utility. This attack is known as __________.

Options:

A.

Port scanning


B.

Cloaking


C.

Firewalking


D.

Spoofing


Expert Solution
Viewing page 7 out of 10 pages
Viewing questions 61-70 out of questions