Vendor: GIAC
Certifications: GIAC Certifications
Exam Name: GIAC Certified Incident Handler (GCIH)
Exam Code: GCIH
Total Questions: 705 Q&As ( View Details)
Last Updated: Mar 19, 2025
Note: Product instant download. Please sign in and click My account to download your product.
VCE
GIAC GCIH Last Month Results
GCIH Q&A's Detail
Exam Code: | GCIH |
Total Questions: | 705 |
Single & Multiple Choice | 705 |
CertBus Has the Latest GCIH Exam Dumps in Both PDF and VCE Format
GCIH Online Practice Questions and Answers
Which of the following refers to a condition in which a hacker sends a bunch of packets that leave TCP ports half open?
A. Spoofing
B. Hacking
C. SYN attack
D. PING attack
You work as a Senior Marketing Manager for Umbrella Inc. You find out that some of the software applications on the systems were malfunctioning and also you were not able to access your remote desktop session. You suspected that some malicious attack was performed on the network of the company. You immediately called the incident response team to handle the situation who enquired the Network Administrator to acquire all relevant information regarding the malfunctioning. The Network Administrator informed the incident response team that he was reviewing the security of the network which caused all these problems. Incident response team announced that this was a controlled event not an incident.
Which of the following steps of an incident handling process was performed by the incident response team?
A. Containment
B. Eradication
C. Preparation
D. Identification
Logs show that a malicious host has remotely accessed the file "Documents and Settings:logs". At what step of the attack process is the attacker most likely operating in?
A. Establishing a backdoor
B. Using steganography
C. Initial reconnaissance
D. Port scanning
E. Covering tracks
Becky is reviewing the password policy for the Firm's Windows network. She would like to make the password minimum length 15 characters. What will be the effect of this change?
A. It will require converting password to all upper case
B. It will require padding password with null bytes
C. It will eliminate the NTLM hash for that account
D. It will eliminate the LANMAN hash for that account
An administrator needs to protect his organization's IIS webservers from Cross-Site Scripting attacks. Which action should he take?
A. Use the Anti-XSS library from Microsoft
B. Configure two-factor authentication for clients
C. Use a random element when setting session cookies
D. Configure application whitelisting on the IIS server
Add Comments
Nice study material, I passed the exam with the help of it. Recommend strongly.
Great job, you guys. I passed my exam with your help! Thanks for everything!
i'm very happy that i passed the exam successfully. Recommend.
Many questions are from the dumps but few question changed. Need to be attention.
i'm so happy that i passed the exam with full score, thanks for this dumps, thanks all.
Today i pass the exam successfully .Thanks for this dumps. Recommend.
I'm so glad that I have chosen you as my assistant with my GCIH exam. I passed my exam. Full scored. I will recommend to friends.
thanks god and thank you all. 100% valid. you can trust on it.
Their dumps is a very recent update. All the new questions are there! Recommend.
Hello, guys. i have passed the exam successfully in the morning,thanks you very much.