Question 16
You work as a Penetration Tester for the Infosec Inc. Your company takes the projects of security auditing.
Recently, your company has assigned you a project to test the security of the we-aresecure.com Web site.
For this, you want to perform the idle scan so that you can get the ports open in the we-are-secure.com server. You are using Hping tool to perform the idle scan by using a zombie computer. While scanning, you notice that every IPID is being incremented on every query, regardless whether the ports are open or close. Sometimes, IPID is being incremented by more than one value.
What may be the reason?
Recently, your company has assigned you a project to test the security of the we-aresecure.com Web site.
For this, you want to perform the idle scan so that you can get the ports open in the we-are-secure.com server. You are using Hping tool to perform the idle scan by using a zombie computer. While scanning, you notice that every IPID is being incremented on every query, regardless whether the ports are open or close. Sometimes, IPID is being incremented by more than one value.
What may be the reason?
Question 17
Adam works as an Incident Handler for Umbrella Inc. He has been sent to the California unit to train the members of the incident response team. As a demo project he asked members of the incident response team to perform the following actions:
* Remove the network cable wires.
* Isolate the system on a separate VLAN
* Use a firewall or access lists to prevent communication into or out of the system.
* Change DNS entries to direct traffic away from compromised system
Which of the following steps of the incident handling process includes the above actions?
* Remove the network cable wires.
* Isolate the system on a separate VLAN
* Use a firewall or access lists to prevent communication into or out of the system.
* Change DNS entries to direct traffic away from compromised system
Which of the following steps of the incident handling process includes the above actions?
Question 18
Victor is a novice Ethical Hacker. He is learning the hacking process, i.e., the steps taken by malicious hackers to
perform hacking. Which of the following steps is NOT included in the hacking process?
perform hacking. Which of the following steps is NOT included in the hacking process?
Question 19
Network mapping provides a security testing team with a blueprint of the organization. Which of the following steps is NOT a part of manual network mapping?
Question 20
In which of the following steps of the incident handling processes does the Incident Handler make sure that all business processes and functions are back to normal and then also wants to monitor the system or processes to ensure that the system is not compromised again?
Premium Bundle
Newest GCIH Exam PDF Dumps shared by BraindumpsPass.com for Helping Passing GCIH Exam! BraindumpsPass.com now offer the updated GCIH exam dumps, the BraindumpsPass.com GCIH exam questions have been updated and answers have been corrected get the latest BraindumpsPass.com GCIH pdf dumps with Exam Engine here: