Buy GIAC GCIH Real Exam Questions - GCIH Dumps

GIAC Certified Incident Handler
GCIH Dumps
Click here for more information
Sample Question : 1
Which of the following are the primary goals of
the incident handling team?
Each correct answer represents a complete
solution. Choose all that apply.
A. Freeze the scene.
B. Repair any damage caused by an incident.
C. Prevent any further damage.
D. Inform higher authorities.
Answer: A,B,C
Sample Question : 2
Which of the following attacks is specially used
for cracking a password?
A. PING attack
B. Dictionary attack
C. Vulnerability attack
D. DoS attack
Answer: B
Sample Question : 3
Which of the following refers to the
exploitation of a valid computer session to gain
unauthorized access to information or services
in a computer system?
A. Piggybacking
B. Hacking
C. Session hijacking
D. Keystroke logging
Answer: C
Sample Question : 4
Which of the following types of attacks is often
performed by looking surreptitiously at the
keyboard or monitor of an employee's
A. Buffer-overflow attack
B. Shoulder surfing attack
C. Man-in-the-middle attack
D. Denial-of-Service (DoS) attack
Answer: B
Sample Question : 5
James works as a Database Administrator for Techsoft Inc. The company has a SQL
Server 2005 computer. The computer has a database named Sales. Users complain that
the performance of the database has deteriorated. James opens the System Monitor tool
and finds that there is an increase in network traffic. What kind of attack might be the
of the performance deterioration?
A. Denial-of-Service
B. Injection
C. Internal attack
D. Virus
Answer: A
GIAC Certified Incident Handler
GCIH Dumps
Click here for more information