Pass the GIAC Security Administration GCIH Questions and answers with CertsForce

Viewing page 8 out of 10 pages
Viewing questions 71-80 out of questions
Questions # 71:

Mark works as a Network Administrator for NetTech Inc. The network has 150 Windows 2000 Professional client computers and four Windows 2000 servers. All the client computers are able to connect to the Internet. Mark is concerned about malware infecting the client computers through the Internet. What will Mark do to protect the client computers from malware?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Educate users of the client computers to avoid malware.


B.

Educate users of the client computers about the problems arising due to malware.


C.

Prevent users of the client computers from executing any programs.


D.

Assign Read-Only permission to the users for accessing the hard disk drives of the client computers.


Expert Solution
Questions # 72:

Which of the following programming languages are NOT vulnerable to buffer overflow attacks?

Each correct answer represents a complete solution. Choose two.

Options:

A.

C


B.

Java


C.

C++


D.

Perl


Expert Solution
Questions # 73:

You work as an Incident handling manager for a company. The public relations process of the company includes an event that responds to the e-mails queries. But since few days, it is identified that this process is providing a way to spammers to perform different types of e-mail attacks. Which of the following phases of the Incident handling process will now be involved in resolving this process and find a solution?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Eradication


B.

Contamination


C.

Preparation


D.

Recovery


E.

Identification


Expert Solution
Questions # 74:

You work as a Network Administrator in the SecureTech Inc. The SecureTech Inc. is using Linux-based server. Recently, you have updated the password policy of the company in which the server will disable passwords after four trials. What type of attack do you want to stop by enabling this policy?

Options:

A.

Brute force


B.

Replay


C.

XSS


D.

Cookie poisoning


Expert Solution
Questions # 75:

John works as a Penetration Tester in a security service providing firm named you-are-secure Inc. Recently, John's company has got a project to test the security of a promotional Website www.missatlanta.com and assigned the pen-testing work to John. When John is performing penetration testing, he inserts the following script in the search box at the company home page:

<script>alert('Hi, John')</script>

After pressing the search button, a pop-up box appears on his screen with the text - "Hi, John." Which of the following attacks can be performed on the Web site tested by john while considering the above scenario?

Options:

A.

Replay attack


B.

CSRF attack


C.

Buffer overflow attack


D.

XSS attack


Expert Solution
Questions # 76:

John works as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company uses Check Point SmartDefense to provide security to the network of the company. On the HTTP servers of the company, John defines a rule for dropping any kind of userdefined URLs. Which of the following types of attacks can be prevented by dropping the user-defined URLs?

Options:

A.

Morris worm


B.

Code red worm


C.

Hybrid attacks


D.

PTC worms and mutations


Expert Solution
Questions # 77:

Which of the following are the automated tools that are used to perform penetration testing?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Pwdump


B.

Nessus


C.

EtherApe


D.

GFI LANguard


Expert Solution
Questions # 78:

Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?

Options:

A.

Kernel keylogger


B.

Software keylogger


C.

Hardware keylogger


D.

OS keylogger


Expert Solution
Questions # 79:

You are hired as a Database Administrator for Jennifer Shopping Cart Inc. You monitor the server health through the System Monitor and found that there is a sudden increase in the number of logins.

Which of the following types of attack has occurred?

Options:

A.

Injection


B.

Virus


C.

Worm


D.

Denial-of-service


Expert Solution
Questions # 80:

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

Options:

A.

Nmap


B.

Ethereal


C.

Ettercap


D.

Netcraft


Expert Solution
Viewing page 8 out of 10 pages
Viewing questions 71-80 out of questions