Pass the GIAC Security Administration GCIH Questions and answers with CertsForce

Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions
Questions # 81:

Which of the following actions is performed by the netcat command given below?

nc 55555 < /etc/passwd

Options:

A.

It changes the /etc/passwd file when connected to the UDP port 55555.


B.

It resets the /etc/passwd file to the UDP port 55555.


C.

It fills the incoming connections to /etc/passwd file.


D.

It grabs the /etc/passwd file when connected to UDP port 55555.


Expert Solution
Questions # 82:

Which of the following statements about Ping of Death attack is true?

Options:

A.

In this type of attack, a hacker sends more traffic to a network address than the buffer can handle.


B.

This type of attack uses common words in either upper or lower case to find a password.


C.

In this type of attack, a hacker maliciously cuts a network cable.


D.

In this type of attack, a hacker sends ICMP packets greater than 65,536 bytes to crash a system.


Expert Solution
Questions # 83:

Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration. The tool uses raw IP packets to determine the following:

What ports are open on our network systems.

What hosts are available on the network.

Identify unauthorized wireless access points.

What services (application name and version) those hosts are offering.

What operating systems (and OS versions) they are running.

What type of packet filters/firewalls are in use.

Which of the following tools is Victor using?

Options:

A.

Nessus


B.

Kismet


C.

Nmap


D.

Sniffer


Expert Solution
Questions # 84:

Adam, a malicious hacker is sniffing the network to inject ARP packets. He injects broadcast frames onto the wire to conduct Man-in-The-Middle attack.

Which of the following is the destination MAC address of a broadcast frame?

Options:

A.

0xDDDDDDDDD


B.

0x00000000000


C.

0xFFFFFFFFFFFF


D.

0xAAAAAAAAAA


Expert Solution
Questions # 85:

Which of the following viruses/worms uses the buffer overflow attack?

Options:

A.

Chernobyl (CIH) virus


B.

Nimda virus


C.

Klez worm


D.

Code red worm


Expert Solution
Questions # 86:

Adam is a novice Web user. He chooses a 22 letters long word from the dictionary as his password.

How long will it take to crack the password by an attacker?

Options:

A.

22 hours


B.

23 days


C.

200 years


D.

5 minutes


Expert Solution
Questions # 87:

You work as a Network Administrator for Marioxnet Inc. You have the responsibility of handling two routers with BGP protocol for the enterprise's network. One of the two routers gets flooded with an unexpected number of data packets, while the other router starves with no packets reaching it. Which of the following attacks can be a potential cause of this?

Options:

A.

Packet manipulation


B.

Denial-of-Service


C.

Spoofing


D.

Eavesdropping


Expert Solution
Questions # 88:

Adam works as a Penetration Tester for Umbrella Inc. A project has been assigned to him check the security of wireless network of the company. He re-injects a captured wireless packet back onto the network. He does this hundreds of times within a second. The packet is correctly encrypted and Adam assumes it is an ARP request packet. The wireless host responds with a stream of responses, all individually encrypted with different IVs.

Which of the following types of attack is Adam performing?

Options:

A.

Replay attack


B.

MAC Spoofing attack


C.

Caffe Latte attack


D.

Network injection attack


Expert Solution
Questions # 89:

In which of the following steps of the incident handling processes does the Incident Handler make sure that all business processes and functions are back to normal and then also wants to monitor the system or processes to ensure that the system is not compromised again?

Options:

A.

Eradication


B.

Lesson Learned


C.

Recovery


D.

Containment


Expert Solution
Questions # 90:

Which of the following can be used as a countermeasure against the SQL injection attack?

Each correct answer represents a complete solution. Choose two.

Options:

A.

mysql_real_escape_string()


B.

session_regenerate_id()


C.

mysql_escape_string()


D.

Prepared statement


Expert Solution
Viewing page 9 out of 10 pages
Viewing questions 81-90 out of questions