Weekend Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

GIAC GCIH GIAC Certified Incident Handler Exam Practice Test

Page: 1 / 33
Total 328 questions

GIAC Certified Incident Handler Questions and Answers

Question 1

You work as a Senior Marketing Manager for Umbrella Inc. You find out that some of the software applications on the systems were malfunctioning and also you were not able to access your remote desktop session. You suspected that some malicious attack was performed on the network of the company. You immediately called the incident response team to handle the situation who enquired the Network Administrator to acquire all relevant information regarding the malfunctioning. The Network Administrator informed the incident response team that he was reviewing the security of the network which caused all these problems. Incident response team announced that this was a controlled event not an incident.

Which of the following steps of an incident handling process was performed by the incident response team?

Options:

A.

Containment

B.

Eradication

C.

Preparation

D.

Identification

Question 2

Which of the following hacking tools provides shell access over ICMP?

Options:

A.

John the Ripper

B.

Nmap

C.

Nessus

D.

Loki

Question 3

Which of the following rootkits adds additional code or replaces portions of an operating system, including both the kernel and associated device drivers?

Options:

A.

Hypervisor rootkit

B.

Boot loader rootkit

C.

Kernel level rootkit

D.

Library rootkit

Question 4

Which of the following is a process of searching unauthorized modems?

Options:

A.

Espionage

B.

Wardialing

C.

System auditing

D.

Scavenging

Question 5

Which of the following tasks can be performed by using netcat utility?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Checking file integrity

B.

Creating a Backdoor

C.

Firewall testing

D.

Port scanning and service identification

Question 6

Which of the following is used to determine the operating system on the remote computer in a network environment?

Options:

A.

Spoofing

B.

Reconnaissance

C.

OS Fingerprinting

D.

Social engineering

Question 7

Which of the following are based on malicious code?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Denial-of-Service (DoS)

B.

Biometrics

C.

Trojan horse

D.

Worm

Question 8

OutGuess is used for __________ attack.

Options:

A.

Steganography

B.

Web password cracking

C.

SQL injection

D.

Man-in-the-middle

Question 9

You execute the following netcat command:

c:\target\nc -1 -p 53 -d -e cmd.exe

What action do you want to perform by issuing the above command?

Options:

A.

Listen the incoming data and performing port scanning

B.

Capture data on port 53 and performing banner grabbing

C.

Capture data on port 53 and delete the remote shell

D.

Listen the incoming traffic on port 53 and execute the remote shell

Question 10

Firewalking is a technique that can be used to gather information about a remote network protected by a firewall. This technique can be used effectively to perform information gathering attacks. In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall. Which of the following are pre-requisites for an attacker to conduct firewalking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

An attacker should know the IP address of a host located behind the firewall.

B.

ICMP packets leaving the network should be allowed.

C.

There should be a backdoor installed on the network.

D.

An attacker should know the IP address of the last known gateway before the firewall.

Question 11

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following would be the most help against Denial of Service (DOS) attacks?

Options:

A.

Packet filtering firewall

B.

Network surveys.

C.

Honey pot

D.

Stateful Packet Inspection (SPI) firewall

Question 12

Which of the following statements is true about a Trojan engine?

Options:

A.

It limits the system resource usage.

B.

It specifies the signatures that keep a watch for a host or a network sending multiple packets to a single host or a single network.

C.

It specifies events that occur in a related manner within a sliding time interval.

D.

It analyzes the nonstandard protocols, such as TFN2K and BO2K.

Question 13

You are monitoring your network's behavior. You find a sudden increase in traffic on the network. It seems to come in bursts and emanate from one specific machine. You have been able to determine that a user of that machine is unaware of the activity and lacks the computer knowledge required to be responsible for a computer attack. What attack might this indicate?

Options:

A.

Spyware

B.

Ping Flood

C.

Denial of Service

D.

Session Hijacking

Question 14

You discover that all available network bandwidth is being used by some unknown service. You discover that UDP packets are being used to connect the echo service on one machine to the chargen service on another machine. What kind of attack is this?

Options:

A.

Smurf

B.

Denial of Service

C.

Evil Twin

D.

Virus

Question 15

Which of the following statements are true regarding SYN flood attack?

Options:

A.

The attacker sends a succession of SYN requests to a target system.

B.

SYN flood is a form of Denial-of-Service (DoS) attack.

C.

The attacker sends thousands and thousands of ACK packets to the victim.

D.

SYN cookies provide protection against the SYN flood by eliminating the resources allocated on the target host.

Question 16

Which of the following are the rules by which an organization operates?

Options:

A.

Acts

B.

Policies

C.

Rules

D.

Manuals

Question 17

You are the Security Consultant and have been hired to check security for a client's network. Your client has stated that he has many concerns but the most critical is the security of Web applications on their Web server. What should be your highest priority then in checking his network?

Options:

A.

Setting up IDS

B.

Port scanning

C.

Vulnerability scanning

D.

Setting up a honey pot

Question 18

Fill in the blank with the appropriate name of the attack.

______ takes best advantage of an existing authenticated connection

Options:

Question 19

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

Options:

A.

Nmap

B.

Ethereal

C.

Ettercap

D.

Netcraft

Question 20

You are hired as a Database Administrator for Jennifer Shopping Cart Inc. You monitor the server health through the System Monitor and found that there is a sudden increase in the number of logins.

Which of the following types of attack has occurred?

Options:

A.

Injection

B.

Virus

C.

Worm

D.

Denial-of-service

Question 21

Which of the following rootkits is used to attack against full disk encryption systems?

Options:

A.

Boot loader rootkit

B.

Library rootkit

C.

Hypervisor rootkit

D.

Kernel level rootkit

Question 22

You work as a Network Penetration tester in the Secure Inc. Your company takes the projects to test the security of various companies. Recently, Secure Inc. has assigned you a project to test the security of a Web site. You go to the Web site login page and you run the following SQL query:

SELECT email, passwd, login_id, full_name

FROM members

WHERE email = 'attacker@somehwere.com'; DROP TABLE members; --'

What task will the above SQL query perform?

Options:

A.

Deletes the database in which members table resides.

B.

Deletes the rows of members table where email id is 'attacker@somehwere.com' given.

C.

Performs the XSS attacks.

D.

Deletes the entire members table.

Question 23

Which of the following are the automated tools that are used to perform penetration testing?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Pwdump

B.

Nessus

C.

EtherApe

D.

GFI LANguard

Question 24

Which of the following attacks can be overcome by applying cryptography?

Options:

A.

Buffer overflow

B.

Web ripping

C.

Sniffing

D.

DoS

Question 25

Which of the following are countermeasures to prevent unauthorized database access attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Session encryption

B.

Removing all stored procedures

C.

Applying strong firewall rules

D.

Input sanitization

Question 26

Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes. On the basis of above information, which of the following types of attack is Adam attempting to perform?

Options:

A.

Fraggle attack

B.

Ping of death attack

C.

SYN Flood attack

D.

Land attack

Question 27

Adam, a novice web user, is very conscious about the security. He wants to visit the Web site that is known to have malicious applets and code. Adam always makes use of a basic Web Browser to perform such testing.

Which of the following web browsers can adequately fill this purpose?

Options:

A.

Mozilla Firefox

B.

Internet explorer

C.

Lynx

D.

Safari

Question 28

John works as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company uses Check Point SmartDefense to provide security to the network of the company. On the HTTP servers of the company, John defines a rule for dropping any kind of userdefined URLs. Which of the following types of attacks can be prevented by dropping the user-defined URLs?

Options:

A.

Morris worm

B.

Code red worm

C.

Hybrid attacks

D.

PTC worms and mutations

Question 29

Which of the following statements are true about Dsniff?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It contains Trojans.

B.

It is a virus.

C.

It is antivirus.

D.

It is a collection of various hacking tools.

Question 30

Fill in the blank with the appropriate term.

______ is a free Unix subsystem that runs on top of Windows.

Options:

Question 31

Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

Options:

A.

Buffer-overflow attack

B.

Shoulder surfing attack

C.

Man-in-the-middle attack

D.

Denial-of-Service (DoS) attack

Question 32

In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entire zone file for a domain from a DNS server. The information provided by the DNS zone can help an attacker gather user names, passwords, and other valuable information. To attempt a zone transfer, an attacker must be connected to a DNS server that is the authoritative server for that zone. Besides this, an attacker can launch a Denial of Service attack against the zone's DNS servers by flooding them with a lot of requests. Which of the following tools can an attacker use to perform a DNS zone transfer?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Host

B.

Dig

C.

DSniff

D.

NSLookup

Question 33

Firekiller 2000 is an example of a __________.

Options:

A.

Security software disabler Trojan

B.

DoS attack Trojan

C.

Data sending Trojan

D.

Remote access Trojan

Question 34

In which of the following attacks does the attacker gather information to perform an access attack?

Options:

A.

Land attack

B.

Reconnaissance attack

C.

Vulnerability attack

D.

DoS attack

Question 35

Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords?

Options:

A.

Rainbow attack

B.

Brute Force attack

C.

Dictionary attack

D.

Hybrid attack

Question 36

You are responsible for security at a company that uses a lot of Web applications. You are most concerned about flaws in those applications allowing some attacker to get into your network. What method would be best for finding such flaws?

Options:

A.

Manual penetration testing

B.

Code review

C.

Automated penetration testing

D.

Vulnerability scanning

Question 37

Which of the following methods can be used to detect session hijacking attack?

Options:

A.

nmap

B.

Brutus

C.

ntop

D.

sniffer

Question 38

You have configured a virtualized Internet browser on your Windows XP professional computer. Using the virtualized Internet browser, you can protect your operating system from which of the following?

Options:

A.

Brute force attack

B.

Mail bombing

C.

Distributed denial of service (DDOS) attack

D.

Malware installation from unknown Web sites

Question 39

Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking on the server of DataSoft Inc. to hone his hacking skills. The company has a Windows-based network. Jason successfully enters the target system remotely by using the advantage of vulnerability. He places a Trojan to maintain future access and then disconnects the remote session. The employees of the company complain to Mark, who works as a Professional Ethical Hacker for DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that some irrelevant log files and signs of Trojans are present on the computers. He suspects that a malicious hacker has accessed the network. Mark takes the help from Forensic Investigators and catches Jason.

Which of the following mistakes made by Jason helped the Forensic Investigators catch him?

Options:

A.

Jason did not perform a vulnerability assessment.

B.

Jason did not perform OS fingerprinting.

C.

Jason did not perform foot printing.

D.

Jason did not perform covering tracks.

E.

Jason did not perform port scanning.

Question 40

Which of the following applications is an example of a data-sending Trojan?

Options:

A.

SubSeven

B.

Senna Spy Generator

C.

Firekiller 2000

D.

eBlaster

Question 41

Which of the following types of attacks is the result of vulnerabilities in a program due to poor programming techniques?

Options:

A.

Evasion attack

B.

Denial-of-Service (DoS) attack

C.

Ping of death attack

D.

Buffer overflow attack

Question 42

Which of the following commands is used to access Windows resources from Linux workstation?

Options:

A.

mutt

B.

scp

C.

rsync

D.

smbclient

Question 43

Your company has been hired to provide consultancy, development, and integration services for a company named Brainbridge International. You have prepared a case study to plan the upgrade for the company. Based on the case study, which of the following steps will you suggest for configuring WebStore1?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Customize IIS 6.0 to display a legal warning page on the generation of the 404.2 and 404.3 errors.

B.

Move the WebStore1 server to the internal network.

C.

Configure IIS 6.0 on WebStore1 to scan the URL for known buffer overflow attacks.

D.

Move the computer account of WebStore1 to the Remote organizational unit (OU).

Question 44

Which of the following statements are true about session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Use of a long random number or string as the session key reduces session hijacking.

B.

It is used to slow the working of victim's network resources.

C.

TCP session hijacking is when a hacker takes over a TCP session between two machines.

D.

It is the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system.

Question 45

Which of the following tools can be used to perform brute force attack on a remote database?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SQLBF

B.

SQLDict

C.

FindSA

D.

nmap

Question 46

Which of the following statements are true about worms?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Worms cause harm to the network by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.

B.

Worms can exist inside files such as Word or Excel documents.

C.

One feature of worms is keystroke logging.

D.

Worms replicate themselves from one system to another without using a host file.

Question 47

You run the following command while using Nikto Web scanner:

perl nikto.pl -h 192.168.0.1 -p 443

What action do you want to perform?

Options:

A.

Using it as a proxy server

B.

Updating Nikto

C.

Seting Nikto for network sniffing

D.

Port scanning

Question 48

Your network is being flooded by ICMP packets. When you trace them down they come from multiple different IP addresses. What kind of attack is this?

Options:

A.

Syn flood

B.

Ping storm

C.

Smurf attack

D.

DDOS

Question 49

You see the career section of a company's Web site and analyze the job profile requirements. You conclude that the company wants professionals who have a sharp knowledge of Windows server 2003 and Windows active directory installation and placement. Which of the following steps are you using to perform hacking?

Options:

A.

Scanning

B.

Covering tracks

C.

Reconnaissance

D.

Gaining access

Page: 1 / 33
Total 328 questions