Free GCIH Exam Braindumps (page: 2)

Page 2 of 177

In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?

  1. Ping of death
  2. Jolt
  3. Fraggle
  4. Teardrop

Answer(s): A



Adam has installed and configured his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Adam notices that when he uses his wireless connection, the speed is sometimes 16 Mbps and sometimes it is only 8 Mbps or less. Adam connects to the management utility wireless router and finds out that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the router's logs and notices that the unfamiliar machine has the same MAC address as his laptop.

Which of the following attacks has been occurred on the wireless network of Adam?

  1. NAT spoofing
  2. DNS cache poisoning
  3. MAC spoofing
  4. ARP spoofing

Answer(s): C



Which of the following is a technique of using a modem to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for computers, Bulletin board systems, and fax machines?

  1. Demon dialing
  2. Warkitting
  3. War driving
  4. Wardialing

Answer(s): D



Network mapping provides a security testing team with a blueprint of the organization. Which of the following steps is NOT a part of manual network mapping?

  1. Gathering private and public IP addresses
  2. Collecting employees information
  3. Banner grabbing
  4. Performing Neotracerouting

Answer(s): D



Page 2 of 177



Post your Comments and Discuss GIAC GCIH exam with other Community members:

Ram Jani 12/30/2018 6:05:35 PM
This exam dumps is ZABARDAST! Good price after discount and real content. I am happy.
INDIA
upvote