Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GCIH Exam Dumps - GIAC Security Administration Questions and Answers

Question # 24

Which of the following rootkits is used to attack against full disk encryption systems?

Options:

A.

Boot loader rootkit

B.

Library rootkit

C.

Hypervisor rootkit

D.

Kernel level rootkit

Buy Now
Question # 25

Which of the following are types of access control attacks?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Spoofing

B.

Brute force attack

C.

Dictionary attack

D.

Mail bombing

Buy Now
Question # 26

Which of the following commands can be used for port scanning?

Options:

A.

nc -t

B.

nc -z

C.

nc -w

D.

nc -g

Buy Now
Question # 27

Which of the following is the best method of accurately identifying the services running on a victim host?

Options:

A.

Use of the manual method of telnet to each of the open ports.

B.

Use of a port scanner to scan each port to confirm the services running.

C.

Use of hit and trial method to guess the services and ports of the victim host.

D.

Use of a vulnerability scanner to try to probe each port to verify which service is running.

Buy Now
Question # 28

Which of the following is used by attackers to obtain an authenticated connection on a network?

Options:

A.

Denial-of-Service (DoS) attack

B.

Replay attack

C.

Man-in-the-middle attack

D.

Back door

Buy Now
Question # 29

Which of the following protocols uses only User Datagram Protocol (UDP)?

Options:

A.

POP3

B.

FTP

C.

ICMP

D.

TFTP

Buy Now
Question # 30

John is a malicious attacker. He illegally accesses the server of We-are-secure Inc. He then places a backdoor in the We-are-secure server and alters its log files. Which of the following steps of malicious hacking includes altering the server log files?

Options:

A.

Maintaining access

B.

Covering tracks

C.

Gaining access

D.

Reconnaissance

Buy Now
Question # 31

You execute the following netcat command:

c:\target\nc -1 -p 53 -d -e cmd.exe

What action do you want to perform by issuing the above command?

Options:

A.

Listen the incoming data and performing port scanning

B.

Capture data on port 53 and performing banner grabbing

C.

Capture data on port 53 and delete the remote shell

D.

Listen the incoming traffic on port 53 and execute the remote shell

Buy Now
Question # 32

Which of the following attacks capture the secret value like a hash and reuse it later to gain access to a system without ever decrypting or decoding the hash?

Options:

A.

Cross Site Scripting attack

B.

Replay attack

C.

Rainbow attack

D.

Hashing attack

Buy Now
Question # 33

Which of the following statements about Denial-of-Service (DoS) attack are true?

Each correct answer represents a complete solution. Choose three.

Options:

A.

It disrupts services to a specific computer.

B.

It changes the configuration of the TCP/IP protocol.

C.

It saturates network resources.

D.

It disrupts connections between two computers, preventing communications between services.

Buy Now
Exam Code: GCIH
Exam Name: GIAC Certified Incident Handler
Last Update: Aug 24, 2025
Questions: 328
GCIH pdf

GCIH PDF

$25.5  $84.99
GCIH Engine

GCIH Testing Engine

$28.5  $94.99
GCIH PDF + Engine

GCIH PDF + Testing Engine

$40.5  $134.99