Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

GCIH GIAC Certified Incident Handler Questions and Answers

Questions 4

Which of the following is a network worm that exploits the RPC sub-system vulnerability present in the Microsoft Windows operating system?

Options:

A.

Win32/Agent

B.

WMA/TrojanDownloader.GetCodec

C.

Win32/Conflicker

D.

Win32/PSW.OnLineGames

Buy Now
Questions 5

Which of the following types of attacks is mounted with the objective of causing a negative impact on the performance of a computer or network?

Options:

A.

Vulnerability attack

B.

Man-in-the-middle attack

C.

Denial-of-Service (DoS) attack

D.

Impersonation attack

Buy Now
Questions 6

Which of the following tools can be used to perform brute force attack on a remote database?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

SQLBF

B.

SQLDict

C.

FindSA

D.

nmap

Buy Now
Questions 7

Which of the following types of attack can guess a hashed password?

Options:

A.

Brute force attack

B.

Evasion attack

C.

Denial of Service attack

D.

Teardrop attack

Buy Now
Questions 8

Which of the following statements are true about a keylogger?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It records all keystrokes on the victim's computer in a predefined log file.

B.

It can be remotely installed on a computer system.

C.

It is a software tool used to trace all or specific activities of a user on a computer.

D.

It uses hidden code to destroy or scramble data on the hard disk.

Buy Now
Questions 9

Which of the following applications is an example of a data-sending Trojan?

Options:

A.

SubSeven

B.

Senna Spy Generator

C.

Firekiller 2000

D.

eBlaster

Buy Now
Questions 10

You work as a Network Administrator for InformSec Inc. You find that the TCP port number 23476 is open on your server. You suspect that there may be a Trojan named Donald Dick installed on your server. Now you want to verify whether Donald Dick is installed on it or not. For this, you want to know the process running on port 23476, as well as the process id, process name, and the path of the process on your server. Which of the following applications will you most likely use to accomplish the task?

Options:

A.

Tripwire

B.

SubSeven

C.

Netstat

D.

Fport

Buy Now
Questions 11

Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

1. Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.

2. Reducing noise by adjusting color and averaging pixel value.

3. Sharpening, Rotating, Resampling, and Softening the image.

Which of the following Steganography attacks is Victor using?

Options:

A.

Stegdetect Attack

B.

Chosen-Stego Attack

C.

Steg-Only Attack

D.

Active Attacks

Buy Now
Questions 12

You send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024 using hping2 utility. This attack is known as __________.

Options:

A.

Port scanning

B.

Cloaking

C.

Firewalking

D.

Spoofing

Buy Now
Questions 13

Which of the following rootkits patches, hooks, or replaces system calls with versions that hide information about the attacker?

Options:

A.

Library rootkit

B.

Kernel level rootkit

C.

Hypervisor rootkit

D.

Boot loader rootkit

Buy Now
Questions 14

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. The company is aware of various types of security attacks and wants to impede them. Hence, management has assigned John a project to port scan the company's Web Server. For this, he uses the nmap port scanner and issues the following command to perform idle port scanning:

nmap -PN -p- -sI IP_Address_of_Company_Server

He analyzes that the server's TCP ports 21, 25, 80, and 111 are open.

Which of the following security policies is the company using during this entire process to mitigate the risk of hacking attacks?

Options:

A.

Non-disclosure agreement

B.

Antivirus policy

C.

Acceptable use policy

D.

Audit policy

Buy Now
Questions 15

Jane works as a Consumer Support Technician for ABC Inc. The company provides troubleshooting support to users. Jane is troubleshooting the computer of a user who has installed software that automatically gains full permissions on his computer. Jane has never seen this software before. Which of the following types of malware is the user facing on his computer?

Options:

A.

Rootkits

B.

Viruses

C.

Spyware

D.

Adware

Buy Now
Questions 16

Maria works as a professional Ethical Hacker. She has been assigned the project of testing the security of www.gentech.com. She is using dumpster diving to gather information about Gentech Inc.

In which of the following steps of malicious hacking does dumpster diving come under?

Options:

A.

Multi-factor authentication

B.

Role-based access control

C.

Mutual authentication

D.

Reconnaissance

Buy Now
Questions 17

Adam works as a Network administrator for Umbrella Inc. He noticed that an ICMP ECHO requests is coming from some suspected outside sources. Adam suspects that some malicious hacker is trying to perform ping sweep attack on the network of the company. To stop this malicious activity, Adam blocks the ICMP ECHO request from any outside sources.

What will be the effect of the action taken by Adam?

Options:

A.

Network turns completely immune from the ping sweep attacks.

B.

Network is still vulnerable to ping sweep attack.

C.

Network is protected from the ping sweep attack until the next reboot of the server.

D.

Network is now vulnerable to Ping of death attack.

Buy Now
Questions 18

Which of the following attacks saturates network resources and disrupts services to a specific computer?

Options:

A.

Replay attack

B.

Teardrop attack

C.

Denial-of-Service (DoS) attack

D.

Polymorphic shell code attack

Buy Now
Questions 19

Peter works as a Network Administrator for the PassGuide Inc. The company has a Windows-based network. All client computers run the Windows XP operating system. The employees of the company complain that suddenly all of the client computers have started working slowly. Peter finds that a malicious hacker is attempting to slow down the computers by flooding the network with a large number of requests. Which of the following attacks is being implemented by the malicious hacker?

Options:

A.

SQL injection attack

B.

Denial-of-Service (DoS) attack

C.

Man-in-the-middle attack

D.

Buffer overflow attack

Buy Now
Questions 20

Which of the following Linux rootkits allows an attacker to hide files, processes, and network connections?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Phalanx2

B.

Beastkit

C.

Adore

D.

Knark

Buy Now
Questions 21

Which of the following incident response team members ensures that the policies of the organization are enforced during the incident response?

Options:

A.

Information Security representative

B.

Legal representative

C.

Human Resource

D.

Technical representative

Buy Now
Questions 22

Which of the following programs is used for bypassing normal authentication for securing remote access to a computer?

Options:

A.

Backdoor

B.

Worm

C.

Adware

D.

Spyware

Buy Now
Questions 23

Which of the following is used to determine the range of IP addresses that are mapped to a live hosts?

Options:

A.

Port sweep

B.

Ping sweep

C.

IP sweep

D.

Telnet sweep

Buy Now
Questions 24

Session splicing is an IDS evasion technique in which an attacker delivers data in multiple small-sized packets to the target computer. Hence, it becomes very difficult for an IDS to detect the attack signatures of such attacks. Which of the following tools can be used to perform session splicing attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Whisker

B.

Fragroute

C.

Nessus

D.

Y.A.T.

Buy Now
Questions 25

John works as a C programmer. He develops the following C program:

#include

#include

#include

int buffer(char *str) {

char buffer1[10];

strcpy(buffer1, str);

return 1;

}

int main(int argc, char *argv[]) {

buffer (argv[1]);

printf("Executed\n");

return 1;

}

His program is vulnerable to a __________ attack.

Options:

A.

SQL injection

B.

Denial-of-Service

C.

Buffer overflow

D.

Cross site scripting

Buy Now
Questions 26

Adam works as an Incident Handler for Umbrella Inc. His recent actions towards the incident are not up to the standard norms of the company. He always forgets some steps and procedures while handling responses as they are very hectic to perform.

Which of the following steps should Adam take to overcome this problem with the least administrative effort?

Options:

A.

Create incident manual read it every time incident occurs.

B.

Appoint someone else to check the procedures.

C.

Create incident checklists.

D.

Create new sub-team to keep check.

Buy Now
Questions 27

In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?

Options:

A.

Ping of death

B.

Jolt

C.

Fraggle

D.

Teardrop

Buy Now
Questions 28

Which of the following types of attacks is the result of vulnerabilities in a program due to poor programming techniques?

Options:

A.

Evasion attack

B.

Denial-of-Service (DoS) attack

C.

Ping of death attack

D.

Buffer overflow attack

Buy Now
Questions 29

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. On the We-are-secure login page, he enters ='or''=' as a username and successfully logs in to the user page of the Web site.

The we-are-secure login page is vulnerable to a __________.

Options:

A.

Dictionary attack

B.

SQL injection attack

C.

Replay attack

D.

Land attack

Buy Now
Questions 30

Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?

Options:

A.

Fraggle

B.

Ping flood

C.

Bonk

D.

Smurf

Buy Now
Questions 31

Which of the following commands is used to access Windows resources from Linux workstation?

Options:

A.

mutt

B.

scp

C.

rsync

D.

smbclient

Buy Now
Questions 32

Adam works as a Senior Programmer for Umbrella Inc. A project has been assigned to him to write a short program to gather user input for a Web application. He wants to keep his program neat and simple. His chooses to use printf(str) where he should have ideally used printf("%s", str).

What attack will his program expose the Web application to?

Options:

A.

Format string attack

B.

Cross Site Scripting attack

C.

SQL injection attack

D.

Sequence++ attack

Buy Now
Questions 33

Adam, a malicious hacker, wants to perform a reliable scan against a remote target. He is not concerned about being stealth at this point.

Which of the following type of scans would be most accurate and reliable?

Options:

A.

UDP sacn

B.

TCP Connect scan

C.

ACK scan

D.

Fin scan

Buy Now
Questions 34

Which of the following methods can be used to detect session hijacking attack?

Options:

A.

nmap

B.

Brutus

C.

ntop

D.

sniffer

Buy Now
Questions 35

Which of the following statements are true about Dsniff?

Each correct answer represents a complete solution. Choose two.

Options:

A.

It contains Trojans.

B.

It is a virus.

C.

It is antivirus.

D.

It is a collection of various hacking tools.

Buy Now
Questions 36

Mark works as a Network Administrator for Net Perfect Inc. The company has a Windows-based network. The company uses Check Point SmartDefense to provide security to the network. Mark uses SmartDefense on the HTTP servers of the company to fix the limitation for the maximum response header length. Which of the following attacks can be blocked by defining this limitation?

Options:

A.

HTR Overflow worms and mutations

B.

Ramen worm attack

C.

Melissa virus attack

D.

Shoulder surfing attack

Buy Now
Questions 37

Which of the following terms describes an attempt to transfer DNS zone data?

Options:

A.

Reconnaissance

B.

Encapsulation

C.

Dumpster diving

D.

Spam

Buy Now
Questions 38

Adam works as a Security Administrator for the Umbrella Inc. A project has been assigned to him to strengthen the security policies of the company, including its password policies. However, due to some old applications, Adam is only able to enforce a password group policy in Active Directory with a minimum of 10 characters. He informed the employees of the company, that the new password policy requires that everyone must have complex passwords with at least 14 characters. Adam wants to ensure that everyone is using complex passwords that meet the new security policy requirements. He logged on to one of the network's domain controllers and runs the following command:

GCIH Question 38

Which of the following actions will this command take?

Options:

A.

Dumps the SAM password hashes to pwd.txt

B.

Dumps the SAM password file to pwd.txt

C.

Dumps the Active Directory password hashes to pwd.txt

D.

The password history file is transferred to pwd.txt

Buy Now
Questions 39

Victor works as a professional Ethical Hacker for SecureEnet Inc. He wants to scan the wireless network of the company. He uses a tool that is a free open-source utility for network exploration. The tool uses raw IP packets to determine the following:

What ports are open on our network systems.

What hosts are available on the network.

Identify unauthorized wireless access points.

What services (application name and version) those hosts are offering.

What operating systems (and OS versions) they are running.

What type of packet filters/firewalls are in use.

Which of the following tools is Victor using?

Options:

A.

Nessus

B.

Kismet

C.

Nmap

D.

Sniffer

Buy Now
Questions 40

Which of the following statements are true regarding SYN flood attack?

Options:

A.

The attacker sends a succession of SYN requests to a target system.

B.

SYN flood is a form of Denial-of-Service (DoS) attack.

C.

The attacker sends thousands and thousands of ACK packets to the victim.

D.

SYN cookies provide protection against the SYN flood by eliminating the resources allocated on the target host.

Buy Now
Questions 41

John works as a Network Administrator for We-are-secure Inc. He finds that TCP port 7597 of the Weare- secure server is open. He suspects that it may be open due to a Trojan installed on the server. He presents a report to the company describing the symptoms of the Trojan. A summary of the report is given below:

Once this Trojan has been installed on the computer, it searches Notpad.exe, renames it Note.com, and then copies itself to the computer as Notepad.exe. Each time Notepad.exe is executed, the Trojan executes and calls the original Notepad to avoid being noticed.

Which of the following Trojans has the symptoms as the one described above?

Options:

A.

NetBus

B.

Qaz

C.

eBlaster

D.

SubSeven

Buy Now
Questions 42

Which of the following rootkits is able to load the original operating system as a virtual machine, thereby enabling it to intercept all hardware calls made by the original operating system?

Options:

A.

Kernel level rootkit

B.

Boot loader rootkit

C.

Hypervisor rootkit

D.

Library rootkit

Buy Now
Questions 43

You work as a Network Administrator for Marioxnet Inc. You have the responsibility of handling two routers with BGP protocol for the enterprise's network. One of the two routers gets flooded with an unexpected number of data packets, while the other router starves with no packets reaching it. Which of the following attacks can be a potential cause of this?

Options:

A.

Packet manipulation

B.

Denial-of-Service

C.

Spoofing

D.

Eavesdropping

Buy Now
Questions 44

Which of the following are open-source vulnerability scanners?

Options:

A.

Nessus

B.

Hackbot

C.

NetRecon

D.

Nikto

Buy Now
Questions 45

Which of the following types of attacks is often performed by looking surreptitiously at the keyboard or monitor of an employee's computer?

Options:

A.

Buffer-overflow attack

B.

Shoulder surfing attack

C.

Man-in-the-middle attack

D.

Denial-of-Service (DoS) attack

Buy Now
Questions 46

Which of the following statements about reconnaissance is true?

Options:

A.

It describes an attempt to transfer DNS zone data.

B.

It is a computer that is used to attract potential intruders or attackers.

C.

It is any program that allows a hacker to connect to a computer without going through the normal authentication process.

D.

It is also known as half-open scanning.

Buy Now
Questions 47

Which of the following keyloggers cannot be detected by anti-virus or anti-spyware products?

Options:

A.

Kernel keylogger

B.

Software keylogger

C.

Hardware keylogger

D.

OS keylogger

Buy Now
Questions 48

Which of the following rootkits is used to attack against full disk encryption systems?

Options:

A.

Boot loader rootkit

B.

Library rootkit

C.

Hypervisor rootkit

D.

Kernel level rootkit

Buy Now
Questions 49

Which of the following can be used to perform session hijacking?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Cross-site scripting

B.

Session fixation

C.

ARP spoofing

D.

Session sidejacking

Buy Now
Exam Code: GCIH
Exam Name: GIAC Certified Incident Handler
Last Update: Jun 30, 2025
Questions: 328

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now GCIH testing engine

PDF (Q&A)

$36.75  $104.99
buy now GCIH pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 04 Jul 2025