獲取最新的GCIH下載 - 所有都在TestpdfTestpdf GIAC 的 GCIH 題庫全面更新,是全球暢銷書籍、讀者公認 GIAC 認證考試必備參考書。能讓您充滿信心地面對 GIAC GCIH 認證考試。這更新版反映了 GIAC 考試的最新變動, 不僅涵蓋了各項重要問題, 還加上了最新的考試知識。你的第一次嘗試使用我們的 GCIH 的培訓材料,這可能會極大地促進你的事業打開新的視野的就業機會。
GIAC GCIH(GIAC認證事件處理程序)認證考試旨在測試和驗證負責管理和回應安全事件的專業人士的技能和專業知識。這是由全球信息保安認證(GIAC)組織提供的一個廣泛認可和受尊重的認證計劃。GCIH認證考試是一個嚴格的測試,評估候選人在事件處理、事件響應和數字取證方面的知識。 最新的 GIAC Information Security GCIH 免費考試真題 (Q252-Q257):問題 #252
Your company has been hired to provide consultancy, development, and integration services for a company named Brainbridge International. You have prepared a case study to plan the upgrade for the company. Based on the case study, which of the following steps will you suggest for configuring WebStore1?
Each correct answer represents a part of the solution. Choose two.
A. Move the WebStore1 server to the internal network.
B. Move the computer account of WebStore1 to the Remote organizational unit (OU).
C. Configure IIS 6.0 on WebStore1 to scan the URL for known buffer overflow attacks.
D. Customize IIS 6.0 to display a legal warning page on the generation of the 404.2 and 404.3 errors.
答案:C,D
問題 #253
CORRECT TEXT
Fill in the blank with the appropriate name of the rootkit.
A _______ rootkit uses device or platform firmware to create a persistent malware image. 答案:
解題說明:
firmware
問題 #254
You work as a Network Administrator in the SecureTech Inc. The SecureTech Inc. is using Linux-based server. Recently,
you have updated the password policy of the company in which the server will disable passwords after four trials.
What type of attack do you want to stop by enabling this policy?
A. Cookie poisoning
B. Brute force
C. Replay
D. XSS
答案:B
問題 #255
Your friend plans to install a Trojan on your computer. He knows that if he gives you a new version of chess.exe, you
will definitely install the game on your computer. He picks up a Trojan and joins it with chess.exe. Which of the
following tools are required in such a scenario?
Each correct answer represents a part of the solution. Choose three.
A. NetBus
B. Yet Another Binder
C. Chess.exe
D. Absinthe
答案:A,B,C
問題 #256
Which of the following tools uses common UNIX/Linux tools like the strings and grep commands to search core
system programs for signatures of the rootkits?