GCIH的中問題集 & GCIH試験復習赤本認証を取得するのは給料を高める重要なものです。GCIH試験に参加する人にとって、GCIH試験を心配する必要がありません。最新の問題集を入手したら、GCIH試験に順調に合格することができます。この問題集はPDF版、ソフト版とオンライン版を含めています。GCIH試験のすべての領域を全面的に含めています。 GIAC Certified Incident Handler 認定 GCIH 試験問題 (Q195-Q200):質問 # 195
An attacker sends a large number of packets to a target computer that causes denial of service.
Which of the following type of attacks is this?
A. Phishing
B. Spoofing
C. Snooping
D. Flooding
正解:D
解説:
Section: Volume A
質問 # 196
John, a part-time hacker, has accessed in unauthorized way to the www.yourbank.com banking Website and stolen
the bank account information of its users and their credit card numbers by using the SQL injection attack. Now, John
wants to sell this information to malicious person Mark and make a deal to get a good amount of money. Since, he
does not want to send the hacked information in the clear text format to Mark; he decides to send information in
hidden text. For this, he takes a steganography tool and hides the information in ASCII text by appending whitespace
to the end of lines and encrypts the hidden information by using the IDEA encryption algorithm. Which of the
following tools is John using for steganography?
A. 2Mosaic
B. Snow.exe
C. Netcat
D. Image Hide
正解:B
質問 # 197
Adam, a novice computer user, works primarily from home as a medical professional. He just bought a brand new Dual Core Pentium computer with over 3 GB of RAM. After about two months of working on his new computer, he notices that it is not running nearly as fast as it used to. Adam uses antivirus software, anti-spyware software, and keeps the computer up-to-date with Microsoft patches. After another month of working on the computer, Adam finds that his computer is even more noticeably slow. He also notices a window or two pop-up on his screen, but they quickly disappear. He has seen these windows show up, even when he has not been on the Internet. Adam notices that his computer only has about 10 GB of free space available. Since his hard drive is a 200 GB hard drive, Adam thinks this is very odd.
Which of the following is the mostly likely the cause of the problem?
A. Computer is infected with stealth virus.
B. Computer is infected with the Self-Replication Worm.
C. Computer is infected with the stealth kernel level rootkit.
D. Computer is infected with the Stealth Trojan Virus.
正解:C
質問 # 198
Which of the following is a technique of using a modem to automatically scan a list of telephone numbers, usually
dialing every number in a local area code to search for computers, Bulletin board systems, and fax machines?
A. Warkitting
B. Wardialing
C. War driving
D. Demon dialing
正解:B
質問 # 199
Which of the following refers to applications or files that are not classified as viruses or Trojan horse programs, but can still negatively affect the performance of the computers on your network and introduce significant security risks to your organization?