All About Actual GCIA Prep
Cause all that matters here is passing the GIAC GCIA exam. Cause all that you need is a high score of GCIA GIAC Certified Intrusion Analyst exam. The only one thing you need to do is downloading Examcollection GCIA exam study guides now. We will not let you down with our money-back guarantee.
Online GIAC GCIA free dumps demo Below:
NEW QUESTION 1
What netsh command should be run to enable IPv6 routing?
Each correct answer represents a part of the solution. Choose two.
- A. netsh interface IPv6 show interface
- B. netsh interface IPv6 add routes
- C. netsh interface IPv6 set interface
- D. netsh interface IPv6 add address
Answer: BC
NEW QUESTION 2
Which of the following tools is used to store the contents of a TDB (Trivial Database) file to the standard output when debugging problems with TDB files?
- A. tcpdump
- B. pdbedit
- C. Winbindd
- D. tdbdump
Answer: D
NEW QUESTION 3
Andrew works as an Administrator for a Windows 2000 based network. The network has a primary external DNS server, and a secondary DNS server located on the ISP's UNIX server, in order to provide fault tolerance. Users complain that they are unable to connect to the URL when using the secondary server. What should Andrew do to resolve the problem?
- A. He should disable the fast zone transfer in the Advanced tab of the Properties window on the secondary serve
- B. He should select the BIND secondaries check box in the Zone Transfer tab of the Properties window on the primary serve
- C. He should select the BIND secondaries check box in the Advanced tab of the Properties window on the primary serve
- D. He should enable the fast zone transfer in the Advanced tab of the Properties window on the primary serve
Answer: C
NEW QUESTION 4
What is the size of a subnet in IPv6?
- A. 264 addresses
- B. 232 addresses
- C. 262 addresses
- D. 2128 addresses
Answer: A
NEW QUESTION 5
Which of the following is the default port for File Transport Protocol (FTP)?
- A. 21
- B. 25
- C. 23
- D. 80
Answer: A
NEW QUESTION 6
Which of the following tools can be used for passive OS fingerprinting?
- A. dig
- B. nmap
- C. ping
- D. tcpdump
Answer: D
NEW QUESTION 7
You work as a Network Administrator for CertLeader Inc. The company has deployed an ASA at the network perimeter. Which of the following types of firewall will you use to create two different communications, one between the client and the firewall, and the other between the firewall and the end server?
- A. Proxy-based firewall
- B. Endian firewall
- C. Stateful firewall
- D. Packet filter firewall
Answer: A
NEW QUESTION 8
Which of the following programs is used to add words to spam e-mails so that the e-mail is not considered spam and therefore is delivered as if it were a normal message?
- A. Adler-32
- B. Hash filtrer
- C. Hash buster
- D. Checksum
Answer: C
NEW QUESTION 9
Which of the following IP packet elements is responsible for authentication while using IPSec?
- A. Authentication Header (AH)
- B. Layer 2 Tunneling Protocol (L2TP)
- C. Internet Key Exchange (IKE)
- D. Encapsulating Security Payload (ESP)
Answer: A
NEW QUESTION 10
You are the Administrator for a corporate network. You are concerned about denial of service attacks.
Which of the following would be the most help against Denial of Service (DOS) attacks?
- A. Network survey
- B. Honey pot
- C. Packet filtering firewall
- D. Stateful Packet Inspection (SPI) firewall
Answer: D
NEW QUESTION 11
Which of the following statements about User Datagram Protocol (UDP) is true?
- A. It is a hardware protoco
- B. It is a connectionless protoco
- C. It is a tunneling protoco
- D. It is a connection-oriented protoco
Answer: B
NEW QUESTION 12
An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this phenomenon:
Which of the following tools can be used as a countermeasure to such an attack?
- A. Obiwan
- B. SmashGuard
- C. Kismet
- D. Absinthe
Answer: B
NEW QUESTION 13
Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc. Which of the following types of Cross-Site Scripting attack Ryan intends to do?
- A. SAX
- B. Persistent
- C. Document Object Model (DOM)
- D. Non persistent
Answer: B
NEW QUESTION 14
Which of the following statements about the traceroute utility are true?
Each correct answer represents a complete solution. Choose all that apply.
- A. It generates a buffer overflow exploit by transforming an attack shell code so that the new attack shell code cannot be recognized by any Intrusion Detection System
- B. It records the time taken for a round trip for each packet at each route
- C. It uses ICMP echo packets to display the Fully Qualified Domain Name (FQDN) and the IP address of each gateway along the route to the remote hos
- D. It is an online tool that performs polymorphic shell code attack
Answer: BC
NEW QUESTION 15
Which of the following utilities can generate a local static route table?
Each correct answer represents a complete solution. Choose two.
- A. ROUTE
- B. PING
- C. NETSTAT
- D. TRACERT
- E. NBTSTAT
Answer: AC
NEW QUESTION 16
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?
- A. Signature-based
- B. Network-based
- C. File-based
- D. Anomaly-based
Answer: D
NEW QUESTION 17
Which of the following proxy servers is placed anonymously between the client and remote server and handles all of the traffic from the client?
- A. Caching proxy server
- B. Web proxy server
- C. Forced proxy server
- D. Open proxy server
Answer: C
NEW QUESTION 18
What is the maximum size of an IP datagram for Ethernet?
- A. 4500 bytes
- B. 1024 bytes
- C. 1200 bytes
- D. 1500 bytes
Answer: D
NEW QUESTION 19
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of the mobile phone. Which of the following tools is Adam using?
- A. FAU
- B. FTK Imager
- C. Galleta
- D. Device Seizure
Answer: D
NEW QUESTION 20
Peter works as a System Administrator for TechSoft Inc. The company uses Linux-based systems.
Peter's manager suspects that someone is trying to log in to his computer in his absence. Which of the following commands will Peter run to show the last unsuccessful login attempts, as well as the users who have last logged in to the manager's system?
Each correct answer represents a complete solution. Choose two.
- A. lastb
- B. pwd
- C. last
- D. rwho -a
Answer: AC
NEW QUESTION 21
......
Thanks for reading the newest GCIA exam dumps! We recommend you to try the PREMIUM Dumpscollection.com GCIA dumps in VCE and PDF here: https://www.dumpscollection.net/dumps/GCIA/ (508 Q&As Dumps)