GIAC Certified Incident Handler
GCIH Exam

You run the following bash script in Linux:

for i in 'cat hostlist.txt' ;do
nc -q 2 -v $i 80 < request.txt done

Where hostlist.txt file contains the list of IP addresses and request.txt is the output file. Which of the following tasks do you want to perform by running this script?

  1. You want to put nmap in the listen mode to the hosts given in the IP address list.
  2. You want to perform banner grabbing to the hosts given in the IP address list.
  3. You want to perform port scanning to the hosts given in the IP address list.
  4. You want to transfer file hostlist.txt to the hosts given in the IP address list.

Answer(s): B



The Klez worm is a mass-mailing worm that exploits a vulnerability to open an executable attachment even in Microsoft Outlook's preview pane. The Klez worm gathers email addresses from the entries of the default Windows Address Book (WAB). Which of the following registry values can be used to identify this worm?

  1. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices
  2. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
  3. HKEY_CURRENT_USER\Software\Microsoft\WAB\WAB4\Wab File Name = "file and pathname of the WAB file"
  4. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

Answer(s): C



John, a part-time hacker, has accessed in unauthorized way to the www.yourbank.com banking Website and stolen the bank account information of its users and their credit card numbers by using the SQL injection attack. Now, John wants to sell this information to malicious person Mark and make a deal to get a good amount of money. Since, he does not want to send the hacked information in the clear text format to Mark; he decides to send information in hidden text. For this, he takes a steganography tool and hides the information in ASCII text by appending whitespace to the end of lines and encrypts the hidden information by using the IDEA encryption algorithm. Which of the following tools is John using for steganography?

  1. Image Hide
  2. 2Mosaic
  3. Snow.exe
  4. Netcat

Answer(s): C



Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?

  1. Fraggle
  2. Ping flood
  3. Bonk
  4. Smurf

Answer(s): C




Niraj
Questions are valid. I just passed.
- India
Upvote


Sarah
Fantastic effort on the practice exam!
- UNITED STATES
Upvote


Marcus
Impressive work on this exam dumps. Love the free version.
- CANADA
Upvote


Emily
Great job on these practice exam questions! You guys are the best.
- CANADA
Upvote


seagal
I just passed (310-025) SCJP test yesterday. Your guide is right on the money and almost covers every question word for word. Great work !
- Edmonton
Upvote


Illya
I passed my exam today with a score of 964. This was a difficult test but the preparation guide was very good. I would not have passed without the materials. Thank you very much for giving me the opportunity to better my life.
- Alberta
Upvote


Jackson
Exam syo-101 Exam I passed my exam today with no problem whatsoever. I just wanted to say a sincere thank you for the outstanding study guide. You guys are a phenomenal help when it comes to study assistance. Thanks and definitely expect to see me again.
- MJ
Upvote


CJ
Exam 1Z0-040: 1Z0-040 passed!!! I have passed my exam 59/60. You people are the boom. Thanks for the exam questions. They were so real!!
- UNITED STATES
Upvote


Oshrit
Dear Support, I passed (as you expected) the Sun Solaris Admin I (310-011) at first trial. Thank you so much.
- Israel
Upvote


Lee W.
Just thought I would let you know I took the CCDA test on Tuesday, like I planned and scored a 902!"
- China
Upvote

Read more ...