GIAC Certified Incident Handler Exam Practice Test

Page: 1 / 14
Total 335 questions
Question 1

Which of the following strategies allows a user to limit access according to unique hardware information supplied by a potential client?



Answer : C


Question 2

Which of the following protocol loggers is used to detect ping sweep?



Answer : D


Question 3

Which of the following options scans the networks for vulnerabilities regarding the security of a network?



Answer : C


Question 4

Which of the following are the rules by which an organization operates?



Answer : B


Question 5

Which of the following is used to gather information about a remote network protected by a firewall?



Answer : D


Question 6

John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-based network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the company complains to John that his system contains an unknown package named as tar.gz and his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that the other computers on the network are also facing the same problem. John discovers that a malicious application is using the synscan tool to randomly generate IP addresses.

Which of the following worms has attacked the computer?



Answer : B


Question 7

Which of the following tools is used for port scanning?



Answer : C


Page:    1 / 14   
Total 335 questions