Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

GCIH Exam Dumps - GIAC Security Administration Questions and Answers

Question # 44

In which of the following attacks does the attacker gather information to perform an access attack?

Options:

A.

Land attack

B.

Reconnaissance attack

C.

Vulnerability attack

D.

DoS attack

Buy Now
Question # 45

You send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024 using hping2 utility. This attack is known as __________.

Options:

A.

Port scanning

B.

Cloaking

C.

Firewalking

D.

Spoofing

Buy Now
Question # 46

John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. The company is aware of various types of security attacks and wants to impede them. Hence, management has assigned John a project to port scan the company's Web Server. For this, he uses the nmap port scanner and issues the following command to perform idle port scanning:

nmap -PN -p- -sI IP_Address_of_Company_Server

He analyzes that the server's TCP ports 21, 25, 80, and 111 are open.

Which of the following security policies is the company using during this entire process to mitigate the risk of hacking attacks?

Options:

A.

Non-disclosure agreement

B.

Antivirus policy

C.

Acceptable use policy

D.

Audit policy

Buy Now
Question # 47

Which of the following can be used as a Trojan vector to infect an information system?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

NetBIOS remote installation

B.

Any fake executable

C.

Spywares and adware

D.

ActiveX controls, VBScript, and Java scripts

Buy Now
Question # 48

You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?

Options:

A.

Nmap

B.

Ethereal

C.

Ettercap

D.

Netcraft

Buy Now
Question # 49

In which of the following malicious hacking steps does email tracking come under?

Options:

A.

Reconnaissance

B.

Gaining access

C.

Maintaining Access

D.

Scanning

Buy Now
Question # 50

You are the Administrator for a corporate network. You are concerned about denial of service attacks.

Which of the following measures would be most helpful in defending against a Denial-of-Service (DoS) attack?

Options:

A.

Implement network based antivirus.

B.

Place a honey pot in the DMZ.

C.

Shorten the timeout for connection attempts.

D.

Implement a strong password policy.

Buy Now
Question # 51

Which of the following statements about reconnaissance is true?

Options:

A.

It describes an attempt to transfer DNS zone data.

B.

It is a computer that is used to attract potential intruders or attackers.

C.

It is any program that allows a hacker to connect to a computer without going through the normal authentication process.

D.

It is also known as half-open scanning.

Buy Now
Question # 52

Which of the following types of malware does not replicate itself but can spread only when the circumstances are beneficial?

Options:

A.

Mass mailer

B.

Worm

C.

Blended threat

D.

Trojan horse

Buy Now
Exam Code: GCIH
Exam Name: GIAC Certified Incident Handler
Last Update: Aug 24, 2025
Questions: 328
GCIH pdf

GCIH PDF

$25.5  $84.99
GCIH Engine

GCIH Testing Engine

$28.5  $94.99
GCIH PDF + Engine

GCIH PDF + Testing Engine

$40.5  $134.99