DumpsFiles
 Request Exam  Contact
  • Home
  • PRACTICE EXAMS
    Oracle
    Fortinet
    Juniper
    Microsoft
    Cisco
    Citrix
    CompTIA
    VMware
    SAP
    EMC
    PMI
    HP
    Salesforce
    Other
  • View All Exams
  • New Dumps Files
  • Upload
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. GIAC
  3. GIAC Certified Incident Handler
  4. GIAC.GCIH.v2024-04-07.q275
  5. Question 1

Join the discussion

Question 1/275

You are the Administrator for a corporate network. You are concerned about denial of service attacks.
Which of the following measures would be most helpful in defending against a Denial-of-Service (DoS) attack?

Correct Answer: C

Add Comments

Your email address will not be published. Required fields are marked *

insert code
Type the characters from the picture.
Rating:
Other Question (275q)
Q1. You are the Administrator for a corporate network. You are concerned about denial of servi...
Q2. Which of the following attacks are examples of Denial-of-service attacks (DoS)? Each corre...
Q3. Which of the following applications is an example of a data-sending Trojan?...
Q4. You are monitoring your network's behavior. You find a sudden increase in traffic on the n...
Q5. In which of the following attacking methods does an attacker distribute incorrect IP addre...
Q6. You want to add a netbus Trojan in the chess.exe game program so that you can gain remote ...
Q7. You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of s...
Q8. Which of the following penetration testing phases involves gathering data from whois, DNS,...
Q9. Adam, a malicious hacker, wants to perform a reliable scan against a remote target. He is ...
Q10. Which of the following types of attacks is often performed by looking surreptitiously at t...
Q11. Which of the following types of malware can an antivirus application disable and destroy? ...
Q12. Which of the following statements about Denial-of-Service (DoS) attack are true? Each corr...
Q13. Which of the following types of attacks is mounted with the objective of causing a negativ...
Q14. Which of the following types of attacks is mounted with the objective of causing a negativ...
Q15. Which of the following is an Internet mapping technique that relies on various BGP collect...
Q16. Which of the following HTTP requests is the SQL injection attack?...
Q17. Which of the following tools can be used to perform brute force attack on a remote databas...
Q18. Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses 'Faulk...
Q19. Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganogr...
Q20. Which of the following malicious software travels across computer networks without the ass...
Q21. Which of the following tools is an automated tool that is used to implement SQL injections...
Q22. In which of the following malicious hacking steps does email tracking come under?...
Q23. John works as an Ethical Hacker for PassGuide Inc. He wants to find out the ports that are...
Q24. In which of the following steps of the incident handling processes does the Incident Handl...
Q25. Adam, a malicious hacker is sniffing the network to inject ARP packets. He injects broadca...
Q26. Adam works as a sales manager for Umbrella Inc. He wants to download software from the Int...
Q27. Which of the following is executed when a predetermined event occurs?...
Q28. Which of the following IP packet elements is responsible for authentication while using IP...
Q29. Against which of the following does SSH provide protection? Each correct answer represents...
Q30. John works as an Ethical Hacker for PassGuide Inc. He wants to find out the ports that are...
Q31. Your friend plans to install a Trojan on your computer. He knows that if he gives you a ne...
Q32. You work as an Incident handling manager for a company. The public relations process of th...
Q33. Adam, a novice web user, is very conscious about the security. He wants to visit the Web s...
Q34. Adam works as a sales manager for Umbrella Inc. He wants to download software from the Int...
Q35. Which of the following can be used to perform session hijacking? Each correct answer repre...
Q36. SIMULATION Fill in the blank with the appropriate name of the tool. ______ scans for rootk...
Q37. Which of the following statements about buffer overflow are true? Each correct answer repr...
Q38. You see the career section of a company's Web site and analyze the job profile requirement...
Q39. You work as a Network Administrator for Net Perfect Inc. The company has a Windows-based n...
Q40. You discover that your network routers are being flooded with broadcast packets that have ...
Q41. Which of the following are types of access control attacks? Each correct answer represents...
Q42. You have inserted a Trojan on your friend's computer and you want to put it in the startup...
Q43. Which of the following types of attacks is targeting a Web server with multiple compromise...
Q44. Mark works as a Network Administrator for Perfect Inc. The company has both wired and wire...
Q45. Which of the following procedures is designed to enable security personnel to identify, mi...
Q46. Which of the following is the process of comparing cryptographic hash functions of system ...
Q47. John works as a professional Ethical Hacker. He is assigned a project to test the security...
Q48. Which of the following penetration testing phases involves gathering data from whois, DNS,...
Q49. You work as a Network Administrator in the SecureTech Inc. The SecureTech Inc. is using Li...
Q50. Which of the following options scans the networks for vulnerabilities regarding the securi...
Q51. You work as a Network Penetration tester in the Secure Inc. Your company takes the project...
Q52. Which of the following programs can be used to detect stealth port scans performed by a ma...
Q53. Adam works as an Incident Handler for Umbrella Inc. He has been sent to the California uni...
Q54. Which of the following are the rules by which an organization operates?...
Q55. John works as a Penetration Tester in a security service providing firm named you-are-secu...
Q56. Which of the following can be used as a countermeasure against the SQL injection attack? E...
Q57. You work as an Incident handler in Mariotrixt.Inc. You have followed the Incident handling...
Q58. In which of the following scanning methods do Windows operating systems send only RST pack...
Q59. Which of the following tools can be used for stress testing of a Web server? Each correct ...
Q60. Which of the following types of skills are required in the members of an incident handling...
Q61. Which of the following statements are true regarding SYN flood attack?...
Q62. Which of the following statements about buffer overflow is true?...
Q63. You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based n...
Q64. Mark works as a Network Administrator for Perfect Inc. The company has both wired and wire...
Q65. CORRECT TEXT Fill in the blank with the correct numeric value. ARP poisoning is achieved i...
Q66. Which of the following applications automatically calculates cryptographic hashes of all k...
Q67. In which of the following attacks does an attacker create the IP packets with a forged (sp...
Q68. Which of the following commands is used to access Windows resources from Linux workstation...
Q69. You see the career section of a company's Web site and analyze the job profile requirement...
Q70. Which of the following keyloggers cannot be detected by anti-virus or anti-spyware product...
Q71. Which of the following are open-source vulnerability scanners?...
Q72. Which of the following attacks allows an attacker to retrieve crucial information from a W...
Q73. Which of the following is a reason to implement security logging on a DNS server?...
Q74. Which of the following malicious code can have more than one type of trigger, multiple tas...
Q75. You are responsible for security at a company that uses a lot of Web applications. You are...
Q76. You have inserted a Trojan on your friend's computer and you want to put it in the startup...
Q77. Who are the primary victims of smurf attacks on the contemporary Internet system?...
Q78. Which of the following tools is used for vulnerability scanning and calls Hydra to launch ...
Q79. Which of the following Nmap commands is used to perform a UDP port scan?...
Q80. Which of the following incident response team members ensures that the policies of the org...
Q81. You want to integrate the Nikto tool with nessus vulnerability scanner. Which of the follo...
Q82. Your company has been hired to provide consultancy, development, and integration services ...
Q83. Adam has installed and configured his wireless network. He has enabled numerous security f...
Q84. Which of the following types of channels is used by Trojans for communication?...
Q85. Fill in the blank with the appropriate term. ______ is a technique used to make sure that ...
Q86. You want to scan your network quickly to detect live hosts by using ICMP ECHO Requests. Wh...
Q87. You work as a Network Administrator for Net Perfect Inc. The company has a Windows-based n...
Q88. Which of the following tools will you use to prevent from session hijacking? Each correct ...
Q89. Which of the following systems is used in the United States to coordinate emergency prepar...
Q90. Which of the following refers to a condition in which a hacker sends a bunch of packets th...
Q91. You have configured a virtualized Internet browser on your Windows XP professional compute...
Q92. Your friend plans to install a Trojan on your computer. He knows that if he gives you a ne...
Q93. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
Q94. John works as a professional Ethical Hacker. He is assigned a project to test the security...
Q95. Which of the following is a computer worm that caused a denial of service on some Internet...
Q96. Which of the following statements is true about the difference between worms and Trojan ho...
Q97. You work as a Security Administrator for Net Perfect Inc. The company has a Windows-based ...
Q98. Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The t...
Q99. You work as a Network Administrator for Marioxnet Inc. You have the responsibility of hand...
Q100. John works as a Network Administrator for Net Perfect Inc. The company has a Windows-based...
Q101. You are the Security Consultant and have been hired to check security for a client's netwo...
Q102. You work as a System Administrator for Happy World Inc. Your company has a server named uC...
Q103. You see the career section of a company's Web site and analyze the job profile requirement...
Q104. Victor works as a professional Ethical Hacker for SecureNet Inc. He wants to use Steganogr...
Q105. Adam, a novice computer user, works primarily from home as a medical professional. He just...
Q106. You want to connect to your friend's computer and run a Trojan on it. Which of the followi...
Q107. John works as a Professional Penetration Tester. He has been assigned a project to test th...
Q108. Which of the following are the automated tools that are used to perform penetration testin...
Q109. Which of the following rootkits adds additional code or replaces portions of an operating ...
Q110. You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of s...
Q111. You enter the netstat -an command in the command prompt and you receive intimation that po...
Q112. Address Resolution Protocol (ARP) spoofing, also known as ARP poisoning or ARP Poison Rout...
Q113. An attacker sends a large number of packets to a target computer that causes denial of ser...
Q114. Which of the following is a network worm that exploits the RPC sub-system vulnerability pr...
Q115. Which of the following is a type of computer security vulnerability typically found in Web...
Q116. You work as a Senior Marketing Manager for Umbrella Inc. You find out that some of the sof...
Q117. Which of the following statements is true about a Trojan engine?...
Q118. Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote ha...
Q119. Which of the following threats is a combination of worm, virus, and Trojan horse character...
Q120. You have configured a virtualized Internet browser on your Windows XP professional compute...
Q121. Which of the following protocol loggers is used to detect ping sweep?...
Q122. Fill in the blank with the appropriate word. StackGuard (as used by Immunix), ssp/ProPolic...
Q123. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
Q124. Which of the following US Acts emphasized a "risk-based policy for cost-effective security...
Q125. John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-ba...
Q126. You work as a System Administrator for Happy World Inc. Your company has a server named uC...
Q127. Which of the following applications automatically calculates cryptographic hashes of all k...
Q128. Which of the following password cracking attacks is based on a pre-calculated hash table t...
Q129. You work as a System Administrator in SunSoft Inc. You are running a virtual machine on Wi...
Q130. You send SYN packets with the exact TTL of the target system starting at port 1 and going ...
Q131. Which of the following tools is described in the statement given below? "It has a database...
Q132. You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008...
Q133. You want to measure the number of heaps used and overflows occurred at a point in time. Wh...
Q134. You want to use PGP files for steganography. Which of the following tools will you use to ...
Q135. Adam, a malicious hacker is sniffing the network to inject ARP packets. He injects broadca...
Q136. You work as a Network Administrator for Net Perfect Inc. The company has a Windows-based n...
Q137. The IT administrator wants to implement a stronger security policy. What are the four most...
Q138. John, a novice web user, makes a new E-mail account and keeps his password as "apple", his...
Q139. Which of the following is an Internet mapping technique that relies on various BGP collect...
Q140. Which of the following statements are true about worms? Each correct answer represents a c...
Q141. In which of the following steps of the incident handling processes does the Incident Handl...
Q142. Adam is a novice Web user. He chooses a 22 letters long word from the dictionary as his pa...
Q143. Which of the following programs is used for bypassing normal authentication for securing r...
Q144. CORRECT TEXT Fill in the blank with the appropriate option to complete the statement below...
Q145. Maria works as the Chief Security Officer for PassGuide Inc. She wants to send secret mess...
Q146. You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008...
Q147. Which of the following is the most common vulnerability that can affect desktop applicatio...
Q148. Adam works as a Network Administrator for PassGuide Inc. He wants to prevent the network f...
Q149. Which of the following statements are true about session hijacking? Each correct answer re...
Q150. Which of the following statements are true about firewalking? Each correct answer represen...
Q151. Which of the following are used to identify who is responsible for responding to an incide...
Q152. Which of the following applications is NOT used for passive OS fingerprinting?...
Q153. Adam works as an Incident Handler for Umbrella Inc. He has been sent to the California uni...
Q154. Which of the following penetration testing phases involves reconnaissance or data gatherin...
Q155. SIMULATION Fill in the blank with the correct numeric value. ARP poisoning is achieved in ...
Q156. Which of the following types of malware can an antivirus application disable and destroy? ...
Q157. Which of the following is a method of gaining access to a system that bypasses normal auth...
Q158. Which of the following are countermeasures to prevent unauthorized database access attacks...
Q159. Adam works as a Security administrator for Umbrella Inc. He runs the following traceroute ...
Q160. Your friend plans to install a Trojan on your computer. He knows that if he gives you a ne...
Q161. Adam works as a Network Administrator for PassGuide Inc. He wants to prevent the network f...
Q162. Which of the following attacking methods allows the bypassing of access control lists on s...
Q163. Which of the following types of attacks come under the category of hacker attacks? Each co...
Q164. Adam, a novice web user, is very conscious about the security. He wants to visit the Web s...
Q165. Which of the following ensures that the investigation process of incident response team do...
Q166. Which of the following refers to applications or files that are not classified as viruses ...
Q167. Which of the following Incident handling process phases is responsible for defining rules,...
Q168. Your company has been hired to provide consultancy, development, and integration services ...
Q169. You are the Administrator for a corporate network. You are concerned about denial of servi...
Q170. Which of the following types of attacks is the result of vulnerabilities in a program due ...
Q171. Which of the following is the Web 2.0 programming methodology that is used to create Web p...
Q172. Which of the following types of rootkits replaces regular application binaries with Trojan...
Q173. Which of the following rootkits is used to attack against full disk encryption systems?...
Q174. John works as a C programmer. He develops the following C program: #include <stdlib.h&g...
Q175. Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of...
Q176. A user is sending a large number of protocol packets to a network in order to saturate its...
Q177. Network mapping provides a security testing team with a blueprint of the organization. Whi...
Q178. Which of the following is used to determine the operating system on the remote computer in...
Q179. What is the purpose of configuring a password protected screen saver on a computer?...
Q180. You run the following command while using Nikto Web scanner: perl nikto.pl -h 192.168.0.1 ...
Q181. Which of the following rootkits is able to load the original operating system as a virtual...
Q182. Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP...
Q183. John is a malicious attacker. He illegally accesses the server of We-are-secure Inc. He th...
Q184. Which of the following types of attacks is targeting a Web server with multiple compromise...
Q185. Adam works as a Security Analyst for Umbrella Inc. Company has a Windows-based network. Al...
Q186. Which of the following statements about threats are true? Each correct answer represents a...
Q187. Adam works as an Incident Handler for Umbrella Inc. He is informed by the senior authoriti...
Q188. Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to hi...
Q189. Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote ha...
Q190. Which of the following is the difference between SSL and S-HTTP?...
Q191. Which of the following tools is used to download the Web pages of a Website on the local s...
Q192. Fill in the blank with the correct numeric value. ARP poisoning is achieved in ______ step...
Q193. In which of the following malicious hacking steps does email tracking come under?...
Q194. Adam, a malicious hacker performs an exploit, which is given below: ######################...
Q195. Adam, a malicious hacker has successfully gained unauthorized access to the Linux system o...
Q196. You discover that your network routers are being flooded with broadcast packets that have ...
Q197. Which of the following steps of incident response is steady in nature?...
Q198. Which of the following tools can be used to detect the steganography?...
Q199. You are the Administrator for a corporate network. You are concerned about denial of servi...
Q200. Which of the following is a technique for creating Internet maps? Each correct answer repr...
Q201. You work as a professional Ethical Hacker. You are assigned a project to test the security...
Q202. Which of the following ensures that a party to a dispute cannot deny the authenticity of t...
Q203. Which of the following tools is used for port scanning?...
Q204. You run the following PHP script: <?php $name = mysql_real_escape_string($_POST["name"]...
Q205. In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,...
Q206. Which of the following are types of access control attacks? Each correct answer represents...
Q207. Which of the following services CANNOT be performed by the nmap utility? Each correct answ...
Q208. Maria works as the Chief Security Officer for PassGuide Inc. She wants to send secret mess...
Q209. Which of the following hacking tools provides shell access over ICMP?...
Q210. You work as a Network Administrator for Marioxnet Inc. You have the responsibility of hand...
Q211. Firekiller 2000 is an example of a __________....
Q212. Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to hi...
Q213. Which of the following statements is true about the difference between worms and Trojan ho...
Q214. Which of the following types of rootkits replaces regular application binaries with Trojan...
Q215. You work as a professional Ethical Hacker. You are assigned a project to test the security...
Q216. A user is sending a large number of protocol packets to a network in order to saturate its...
Q217. Which of the following refers to the exploitation of a valid computer session to gain unau...
Q218. In which of the following attacks does an attacker spoof the source address in IP packets ...
Q219. John, a part-time hacker, has accessed in unauthorized way to the www.yourbank.com banking...
Q220. Victor wants to send an encrypted message to his friend. He is using certain steganography...
Q221. You work as a Senior Marketing Manager for Umbrella Inc. You find out that some of the sof...
Q222. Choose the correct actions performed during the Eradication step of the incident handling ...
Q223. John works as a professional Ethical Hacker. He has been assigned the project of testing t...
Q224. Maria works as a professional Ethical Hacker. She has been assigned the project of testing...
Q225. You are concerned about rootkits on your network communicating with attackers outside your...
Q226. You work as a Senior Marketing Manager for Umbrella Inc. You find out that some of the sof...
Q227. In which of the following attacks does an attacker create the IP packets with a forged (sp...
Q228. In which of the following attacks does an attacker use packet sniffing to read network tra...
Q229. Which of the following procedures is designed to enable security personnel to identify, mi...
Q230. Which of the following tools can be used for steganography? Each correct answer represents...
Q231. Choose and reorder the steps of an incident handling process in their correct order. (Exhi...
Q232. Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed tha...
Q233. Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of p...
Q234. Which of the following tools can be used to detect the steganography?...
Q235. Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to hi...
Q236. Which of the following tools are used as a network traffic monitoring tool in the Linux op...
Q237. You are monitoring your network's behavior. You find a sudden increase in traffic on the n...
Q238. You want to add a netbus Trojan in the chess.exe game program so that you can gain remote ...
Q239. Which of the following attacks come under the category of layer 2 Denial-of-Service attack...
Q240. Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP...
Q241. You execute the following netcat command: c:\target\nc -1 -p 53 -d -e cmd.exe What action ...
Q242. Which of the following provides packet-level encryption between hosts in a LAN?...
Q243. Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote ha...
Q244. Which of the following US Acts emphasized a "risk-based policy for cost-effective security...
Q245. Which of the following is designed to protect the Internet resolvers (clients) from forged...
Q246. SIMULATION Fill in the blank with the appropriate term. ______ is a free Unix subsystem th...
Q247. Which of the following strategies allows a user to limit access according to unique hardwa...
Q248. Which of the following Denial-of-Service (DoS) attacks employ IP fragmentation mechanism? ...
Q249. Your friend plans to install a Trojan on your computer. He knows that if he gives you a ne...
Q250. Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The t...
Q251. An Active Attack is a type of steganography attack in which the attacker changes the carri...
Q252. Which of the following tools uses common UNIX/Linux tools like the strings and grep comman...
Q253. Many organizations create network maps of their network system to visualize the network an...
Q254. Which of the following is a computer worm that caused a denial of service on some Internet...
Q255. Network mapping provides a security testing team with a blueprint of the organization. Whi...
Q256. You work as a Network Administrator for Perfect Solutions Inc. The company has a Linux-bas...
Q257. The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable a...
Q258. John works as a Network Administrator for We-are-secure Inc. He finds that TCP port 7597 o...
Q259. OutGuess is used for __________ attack.
Q260. Fill in the blank with the appropriate term. _______is the practice of monitoring and pote...
Q261. Adam works as a Penetration Tester for Umbrella Inc. A project has been assigned to him ch...
Q262. You check performance logs and note that there has been a recent dramatic increase in the ...
Q263. Fill in the blank with the appropriate option to complete the statement below. You want to...
Q264. Session splicing is an IDS evasion technique in which an attacker delivers data in multipl...
Q265. Against which of the following does SSH provide protection? Each correct answer represents...
Q266. Which of the following is a technique of using a modem to automatically scan a list of tel...
Q267. Adam works as an Incident Handler for Umbrella Inc. He is informed by the senior authoriti...
Q268. Which of the following refers to the exploitation of a valid computer session to gain unau...
Q269. James works as a Database Administrator for Techsoft Inc. The company has a SQL Server 200...
Q270. Which of the following rootkits adds additional code or replaces portions of an operating ...
Q271. Adam, a malicious hacker is running a scan. Statistics of the scan is as follows: Scan dir...
Q272. John works as a professional Ethical Hacker. He has been assigned a project to test the se...
Q273. Which of the following attacking methods allows the bypassing of access control lists on s...
Q274. You work as a Network Administrator in the SecureTech Inc. The SecureTech Inc. is using Li...
Q275. Which of the following statements about buffer overflow are true? Each correct answer repr...
[×]

Download PDF File

Enter your email address to download GIAC.GCIH.v2024-04-07.q275.pdf

Email:

DumpsFiles

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2025 DumpsFiles

www.dumpsfiles.com materials do not contain actual questions and answers from Cisco's certification exams.