15.01.2015 Views

GIAC GCIH CertifySchool Exam Actual Questions (PDF)

For more Full product Details:www.CertifySchool.com Our workable study material for exam meets the exact and accurate exam questions and answers. So that’s why CertifySchool is popular in the field of IT Certification Exams material providers.Please visit site: www.CertifySchool.com/

For more Full product Details:www.CertifySchool.com
Our workable study material for exam meets the exact and accurate exam questions and answers. So that’s why CertifySchool is popular in the field of IT Certification Exams material providers.Please visit site: www.CertifySchool.com/

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

www.<strong>CertifySchool</strong>.com Certification Preparation Material (<strong>PDF</strong>)<br />

A. IIS buffer overflow<br />

B. NetBIOS NULL session<br />

C. SNMP enumeration<br />

D. DNS zone transfer<br />

Question: 12<br />

Answer: A<br />

Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online<br />

discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform<br />

acts like account hijacking, history theft etc. Which of the following types of Cross-Site Scripting attack Ryan intends<br />

to do<br />

A. Non persistent<br />

B. Document Object Model (DOM)<br />

C. SAX<br />

D. Persistent<br />

Question: 13<br />

Answer: D<br />

Which of the following applications is an example of a data-sending Trojan<br />

A. SubSeven<br />

B. Senna Spy Generator<br />

C. Firekiller 2000<br />

D. eBlaster<br />

Question: 14<br />

Answer: D<br />

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-aresecure.com.<br />

On the We-are-secure login page, he enters ='or''=' as a username and successfully logs in to the user<br />

page of the Web site. The We-are-secure login page is vulnerable to a __________.<br />

A. Dictionary attack<br />

B. SQL injection attack<br />

C. Replay attack<br />

D. Land attack<br />

Question: 15<br />

Answer: B<br />

Which of the following statements are true about worms<br />

http://www.certifyschool.com/exam/<strong>GCIH</strong>/<br />

Page | 5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!