GIAC Certified Incident Handler
GCIH Exam

Which of the following statements are true about a keylogger?
Each correct answer represents a complete solution. (Choose all that apply.)

  1. It records all keystrokes on the victim's computer in a predefined log file.
  2. It can be remotely installed on a computer system.
  3. It is a software tool used to trace all or specific activities of a user on a computer.
  4. It uses hidden code to destroy or scramble data on the hard disk.

Answer(s): A,B,C



John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we- are-secure.com. He performs Web vulnerability scanning on the We-are-secure server. The output of the scanning test is as follows:

C:\whisker.pl -h target_IP_address
-- whisker / v1.4.0 / rain forest puppy / www.wiretrip.net -- = - = - = - = - =
= Host: target_IP_address
= Server: Apache/1.3.12 (Win32) ApacheJServ/1.1
mod_ssl/2.6.4 OpenSSL/0.9.5a mod_perl/1.22
+ 200 OK: HEAD /cgi-bin/printenv

John recognizes /cgi-bin/printenv vulnerability ('Printenv' vulnerability) in the We_are_secure server. Which of the following statements about 'Printenv' vulnerability are true?

Each correct answer represents a complete solution. (Choose all that apply.)

  1. This vulnerability helps in a cross site scripting attack.
  2. 'Printenv' vulnerability maintains a log file of user activities on the Website, which may be useful for the attacker.
  3. The countermeasure to 'printenv' vulnerability is to remove the CGI script.
  4. With the help of 'printenv' vulnerability, an attacker can input specially crafted links and/or other malicious scripts.

Answer(s): A,C,D



Which of the following statements about buffer overflow is true?

  1. It manages security credentials and public keys for message encryption.
  2. It is a collection of files used by Microsoft for software updates released between major service pack releases.
  3. It is a condition in which an application receives more data than it is configured to accept.
  4. It is a false warning about a virus.

Answer(s): C



Which of the following commands is used to access Windows resources from Linux workstation?

  1. mutt
  2. scp
  3. rsync
  4. smbclient

Answer(s): D




Xiwan W
Great Price....Great Product. Keep up the good work!
- China
Upvote


Ashwin
So far your practice exams are extremely helpful. My test scores keep on going up every time I do them and I feel very confident now.
- India
Upvote


Mike M
The exams was excellent and helped me pass without any doubt.Very helpful! Thank you! I passed!
- UNITED ARAB EMIRATES
Upvote


Smart one
You guys rock. I just passed my 920-139 exam with 929 marks. Thanks for accurate & descriptive question bank.
- UK
Upvote


C J
Just to let you know, I passed my exam. Thank you,
- Mexico
Upvote


Mr. P
I just have to say a big thank you to you guys... i passed 70-552 exams with 896. You guys are the bomb! Keep the faith and the flag of being good. A big thank you once again.(10Q ALL).
- GERMANY
Upvote


Darwin
I passed the Novell 640-822 exam on this last Thursday after using your online test and IPad. This is my first experience with your exams. I'll be using your material from now on. In a few days I'll purchase my last study material for the C
- France
Upvote


Bila
Thanks! I passed 070-284 with 880 070-219 next to complete my MCSE.
- Colorado
Upvote


Passed
I just took my Certification testing for 10-184 Microsoft CRM Installation and Configuration. Your test questions definitely covered the essence of the exam material and I easily passed the exam.
- UNITED STATES
Upvote


Ed
I passed the IBM exam successfully
- UNITED STATES
Upvote

Read more ...