Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GCIH GIAC Certified Incident Handler Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GCIH GIAC Certified Incident Handler certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 5
Total 328 questions

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following would be the most help against Denial of Service (DOS) attacks?

A.

Packet filtering firewall

B.

Network surveys.

C.

Honey pot

D.

Stateful Packet Inspection (SPI) firewall

Which of the following attacks involves multiple compromised systems to attack a single target?

A.

Brute force attack

B.

Replay attack

C.

Dictionary attack

D.

DDoS attack

When you conduct the XMAS scanning using Nmap, you find that most of the ports scanned do not give a response. What can be the state of these ports?

A.

Filtered

B.

Open

C.

Closed

John works as an Ethical Hacker for PassGuide Inc. He wants to find out the ports that are open in PassGuide's server using a port scanner. However, he does not want to establish a full TCP connection.

Which of the following scanning techniques will he use to accomplish this task?

A.

TCP FIN

B.

TCP SYN/ACK

C.

TCP SYN

D.

Xmas tree

You want to add a netbus Trojan in the chess.exe game program so that you can gain remote access to a friend's computer. Which of the following tools will you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

Tripwire

B.

Yet Another Binder

C.

Pretator Wrapper

D.

Beast

Which of the following provides packet-level encryption between hosts in a LAN?

A.

PPTP

B.

IPsec

C.

PFS

D.

Tunneling protocol

Adam works as a Security Administrator for Umbrella Technology Inc. He reported a breach in security to his senior members, stating that "security defenses has been breached and exploited for 2 weeks by hackers." The hackers had accessed and downloaded 50,000 addresses containing customer credit cards and passwords. Umbrella Technology was looking to law enforcement officials to protect their intellectual property.

The intruder entered through an employee's home machine, which was connected to Umbrella Technology's corporate VPN network. The application called BEAST Trojan was used in the attack to open a "back door" allowing the hackers undetected access. The security breach was discovered when customers complained about the usage of their credit cards without their knowledge.

The hackers were traced back to Shanghai, China through e-mail address evidence. The credit card information was sent to that same e-mail address. The passwords allowed the hackers to access Umbrella Technology's network from a remote location, posing as employees.

Which of the following actions can Adam perform to prevent such attacks from occurring in future?

A.

Allow VPN access but replace the standard authentication with biometric authentication

B.

Replace the VPN access with dial-up modem access to the company's network

C.

Disable VPN access to all employees of the company from home machines

D.

Apply different security policy to make passwords of employees more complex

Which of the following controls is described in the statement given below?

"It ensures that the enforcement of organizational security policy does not rely on voluntary web application user compliance. It secures information by assigning sensitivity labels on information and comparing this to the level of security a user is operating at."

A.

Role-based Access Control

B.

Attribute-based Access Control

C.

Discretionary Access Control

D.

Mandatory Access Control

Which of the following types of scan does not open a full TCP connection?

A.

FIN scan

B.

ACK scan

C.

Stealth scan

D.

Idle scan

Which of the following statements is true about a Trojan engine?

A.

It limits the system resource usage.

B.

It specifies the signatures that keep a watch for a host or a network sending multiple packets to a single host or a single network.

C.

It specifies events that occur in a related manner within a sliding time interval.

D.

It analyzes the nonstandard protocols, such as TFN2K and BO2K.

Which of the following options scans the networks for vulnerabilities regarding the security of a network?

A.

System enumerators

B.

Port enumerators

C.

Network enumerators

D.

Vulnerability enumerators

Maria works as a professional Ethical Hacker. She has been assigned the project of testing the security of www.gentech.com. She is using dumpster diving to gather information about Gentech Inc.

In which of the following steps of malicious hacking does dumpster diving come under?

A.

Multi-factor authentication

B.

Role-based access control

C.

Mutual authentication

D.

Reconnaissance

John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-based network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the company complains to John that his system contains an unknown package named as tar.gz and his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that the other computers on the network are also facing the same problem. John discovers that a malicious application is using the synscan tool to randomly generate IP addresses.

Which of the following worms has attacked the computer?

A.

Code red

B.

Ramen

C.

LoveLetter

D.

Nimda

Your friend plans to install a Trojan on your computer. He knows that if he gives you a new version of chess.exe, you will definitely install the game on your computer. He picks up a Trojan and joins it to chess.exe. The size of chess.exe was 526,895 bytes originally, and after joining this chess file to the Trojan, the file size increased to 651,823 bytes. When he gives you this new game, you install the infected chess.exe file on your computer. He now performs various malicious tasks on your computer remotely. But you suspect that someone has installed a Trojan on your computer and begin to investigate it. When you enter the netstat command in the command prompt, you get the following results:

C:\WINDOWS>netstat -an | find "UDP" UDP IP_Address:31337 *:*

Now you check the following registry address:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices

In the above address, you notice a 'default' key in the 'Name' field having " .exe" value in the corresponding 'Data' field. Which of the following Trojans do you think your friend may have installed on your computer on the basis of the above evidence?

A.

Qaz

B.

Donald Dick

C.

Tini

D.

Back Orifice

Which of the following are the limitations for the cross site request forgery (CSRF) attack?

Each correct answer represents a complete solution. Choose all that apply.

A.

The attacker must determine the right values for all the form inputs.

B.

The attacker must target a site that doesn't check the referrer header.

C.

The target site should have limited lifetime authentication cookies.

D.

The target site should authenticate in GET and POST parameters, not only cookies.

Which of the following is used by attackers to obtain an authenticated connection on a network?

A.

Denial-of-Service (DoS) attack

B.

Replay attack

C.

Man-in-the-middle attack

D.

Back door

Alice wants to prove her identity to Bob. Bob requests her password as proof of identity, which Alice dutifully provides (possibly after some transformation like a hash function); meanwhile, Eve is eavesdropping the conversation and keeps the password. After the interchange is over, Eve connects to Bob posing as Alice; when asked for a proof of identity, Eve sends Alice's password read from the last session, which Bob accepts. Which of the following attacks is being used by Eve?

A.

Replay

B.

Firewalking

C.

Session fixation

D.

Cross site scripting

Jane works as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. Jane is troubleshooting the computer of a user who has installed software that automatically gains full permissions on his computer. Jane has never seen this software before. Which of the following types of malware is the user facing on his computer?

A.

Rootkits

B.

Viruses

C.

Spyware

D.

Adware

Which of the following protocol loggers is used to detect ping sweep?

A.

lppi

B.

pitl

C.

dpsl

D.

ippl

Which of the following is a method of gaining access to a system that bypasses normal authentication?

A.

Teardrop

B.

Trojan horse

C.

Back door

D.

Smurf

Page: 1 / 5
Total 328 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved