Free Certification Practice Questions

GIAC-GCIH

Loading…
An investigator performing an initial analysis of a memory image identified a suspicious URL while using the strings utility. A second investigator attempting to recreate the results cannot find the same URL when executing the command below. What could be the cause?$ strings CASE-43110.mem > case-43110.strings.txt
#151
The tools and techniques used in memory analysis closely resembles which other type of investigation?
#152
Which of the following Metasploit module types would contain scanning capabilities?
#153
Which of the following persistence techniques will be identified using the Autoruns utility?
#154
What is the destination endpoint host for the SSH session shown below?ssh - L 1777:192.168.1.80:23 [email protected]
#155
Which of the following files would grow to a large size as a result of a brute force attack?
#156
Which malware investigation approach provides a detailed log of a system’s file system, network, registry and process activities?
#157
Which PowerShell cmdlet will display the command line parameters used to launch a Windows process?
#158
Which of the following logs could be queried to identify Azure, Amazon and Google storage use in an organization?
#159
What is the outcome of the command below?hashcat -m 0 -a 3 ntds.dat --potfile-path ntds.potfile -1 ?d?d?d?d?d?d
#160
What hash type is being cracked in the command below?hashcat -m 1800 -a 0 customer.ntds wordlist.txt --potfile-path ./hashcat.potfile
#161
What UNIX component can be used to enforce password complexity requirements?
#162
Which web application log keyword would be associated with a SQL injection attack?
#163
Which endpoint security bypass technique leverages existing system tools instead of adding executable?
#164
Based on the nmap data in the screenshot the analyst would choose which IP address for a DNS attack?
#165
An attacker is hoping to discover as many IP addresses associated with a target domain as possible. Which command would be helpful?
#166
The following output shows reconnaissance activity against which platform?
#167
A security examiner has been given permission by senior management to conduct a password audit. What should the examiner ensure after the process completes?
#168
What is downloaded when the following command is executed?$ bucket_finder.rb words --download
#169
Which Windows process would an attacker target to steal credentials from a user who logs into applications with a Password Manager?
#170
What is the first decision point of an incident investigation?
#171
While examining multiple compromised systems, an investigator lists a priority for each machine based on executive input and the type of service and data each machine provides the organization. Which investigative technique does this describe?
#172
Which activity helps readdress security tasks identified in past incident reports?
#173
What is the Linux administrator doing with the commands below?$ rpcclient -U fezzik florinrpcclient $> enumdomusers
#174
Which of the following can the rpcclient application do?
#175
What task is a Windows administrator performing with the command below, executed from a file server with an IP address of 46.95.101.82?C:\> net session \\46.95.101.109 /del
#176
How does the use of endpoint application allow lists impact malware attacks against the system?
#177
What shortcoming of the traditional PICERL incident response model is addressed by adopting a dynamic incident response model like DAIR?
#178
Which of the following SSH commands will start a SOCKS proxy server on the local system?
#179
A web application receives the following input from a malicious request. What is the attacker attempting to do?select accountbalance from user where name = jake' OR 'z'='z';
#180