Free Practice Test

GIAC GCIH Free Practice Questions – 2026 Updated

GIAC GCIH

View Mode
Q: 1
Which of the following attacks can be overcome by applying cryptography?
Options
Q: 2
Which of the following provides packet-level encryption between hosts in a LAN?
Options
Q: 3
As a professional hacker, you want to crack the security of secureserver.com. For this, in the information gathering step, you performed scanning with the help of nmap utility to retrieve as many different protocols as possible being used by the secureserver.com so that you could get the accurate knowledge about what services were being used by the secure server.com. Which of the following nmap switches have you used to accomplish the task?
Options
Q: 4
Adam, a malicious hacker purposely sends fragmented ICMP packets to a remote target. The total size of this ICMP packet once reconstructed is over 65,536 bytes. On the basis of above information, which of the following types of attack is Adam attempting to perform?
Options
Q: 5
Which of the following types of attacks is the result of vulnerabilities in a program due to poor programming techniques?
Options
Q: 6
You want to perform passive footprinting against we-are-secure Inc. Web server. Which of the following tools will you use?
Options
Q: 7
You work as a Security Administrator for Net Perfect Inc. The company has a Windows-based network. You want to use a scanning technique which works as a reconnaissance attack. The technique should direct to a specific host or network to determine the services that the host offers. Which of the following scanning techniques can you use to accomplish the task?
Options
Q: 8
In which of the following methods does an hacker use packet sniffing to read network traffic between two parties to steal the session cookies?
Options
Q: 9
You have inserted a Trojan on your friend's computer and you want to put it in the startup so that whenever the computer reboots the Trojan will start to run on the startup. Which of the following registry entries will you edit to accomplish the task?
Options
Q: 10
Which of the following rootkits is used to attack against full disk encryption systems?
Options
Q: 11
In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entire zone file for a domain from a DNS server. The information provided by the DNS zone can help an attacker gather user names, passwords, and other valuable information. To attempt a zone transfer, an attacker must be connected to a DNS server that is the authoritative server for that zone. Besides this, an attacker can launch a Denial of Service attack against the zone's DNS servers by flooding them with a lot of requests. Which of the following tools can an attacker use to perform a DNS zone transfer? Each correct answer represents a complete solution. Choose all that apply.
Options
Q: 12
Adam works as an Incident Handler for Umbrella Inc. He has been sent to the California unit to train the members of the incident response team. As a demo project he asked members of the incident response team to perform the following actions: Remove the network cable wires. Isolate the system on a separate VLAN. Use a firewall or access lists to prevent communication into or out of the system. Change DNS entries to direct traffic away from compromised system. Which of the following steps of the incident handling process includes the above actions?
Options
Q: 13

Maria works as a professional Ethical Hacker. She recently got a project to test the security of www.we-are-secure.com. Arrange the three pre-test phases of the attack to test the security of weare-secure. GIAC GCIH question

Your Answer
Q: 14

Fill in the blank with the appropriate name of the rootkit. A _______ rootkit uses device or platform firmware to create a persistent malware image.

Your Answer
Q: 15

Rick works as a Professional Ethical Hacker for PassGuide Inc. The company has opened a new branch that uses Windows-based computers. Rick has been assigned a project to check the network security of the new branch office. He wants to ensure that the company is free from remote hacking attacks. Choose the appropriate steps that Rick should perform to accomplish the task. GIAC GCIH question

Your Answer
Q: 16

Choose and reorder the steps of an incident handling process in their correct order. GIAC GCIH question

Your Answer
Q: 17

Choose the items from the given list that are required to be in the response kit of an Incident Handler. GIAC GCIH question

Your Answer
Q: 18

Fill in the blank with the appropriate term. ______ is a free Unix subsystem that runs on top of Windows.

Your Answer
Q: 19

Choose the correct actions performed during the Eradication step of the incident handling process. GIAC GCIH question

Your Answer
Q: 20

Fill in the blank with the appropriate word. StackGuard (as used by Immunix), ssp/ProPolice (as used by OpenBSD), and Microsoft's /GS option use ______ defense against buffer overflow attacks.

Your Answer
Q: 21

Choose the correct six-step process of threat modeling from the list of different steps. GIAC GCIH question

Your Answer
Q: 22

Fill in the blank with the correct numeric value. ARP poisoning is achieved in ______ steps.

Options
Q: 23

Fill in the blank with the appropriate name of the attack. ______ takes best advantage of an existing authenticated connection

Your Answer
Q: 24

Fill in the blank with the appropriate option to complete the statement below. You want to block all UDP packets coming to the Linux server using the portsentry utility. For this, you have to enable the ______ option in the portsentry configuration file.

Your Answer
Q: 25

Drag and drop the mapping techniques to their respective descriptions. GIAC GCIH question

Drag & Drop
Q: 26
Which of the following rootkits adds additional code or replaces portions of an operating system, including both the kernel and associated device drivers?
Options
Q: 27
Your IDS discovers that an intruder has gained access to your system. You immediately stop that access, change passwords for administrative accounts, and secure your network. You discover an odd account (not administrative) that has permission to remotely access the network. What is this most likely?
Options
Q: 28
Which of the following statements are correct about spoofing and session hijacking? Each correct answer represents a complete solution. Choose all that apply.
Options
Q: 29
An Active Attack is a type of steganography attack in which the attacker changes the carrier during the communication process. Which of the following techniques is used for smoothing the transition and controlling contrast on the hard edges, where there is significant color transition?
Options
Q: 30
Which of the following is used by attackers to obtain an authenticated connection on a network?
Options
Q: 31
Which of the following are based on malicious code? Each correct answer represents a complete solution. Choose two.
Options
Q: 32
You want to add a netbus Trojan in the chess.exe game program so that you can gain remote access to a friend's computer. Which of the following tools will you use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
Options
Q: 33
John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.
Options
Q: 34
Which of the following statements is true about a Trojan engine?
Options
Q: 35
A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as network saturation attack or bandwidth consumption attack. Attackers perform DoS attacks by sending a large number of protocol packets to a network. The problems caused by a DoS attack are as follows: l Saturation of network resources l Disruption of connections between two computers, thereby preventing communications between services l Disruption of services to a specific computer l Failure to access a Web site l Increase in the amount of spam Which of the following can be used as countermeasures against DoS attacks? Each correct answer represents a complete solution. Choose all that apply.
Options
Question 1 of 35

Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE