Most Up-to-date GIAC Certified Intrusion Analyst GCIA Exam Answers

Exam Code: GCIA (Practice Exam Latest Test Questions VCE PDF)
Exam Name: GIAC Certified Intrusion Analyst
Certification Provider: GIAC
Free Today! Guaranteed Training- Pass GCIA Exam.

Check GCIA free dumps before getting the full version:

NEW QUESTION 1
Which of the following is a checksum algorithm?

  • A. Hash buster
  • B. Snort
  • C. Adler-32
  • D. Dsniff

Answer: C

NEW QUESTION 2
Which of the following tools implements a portable framework in tcpdump for capturing low-level network traffics in UNIX like networks?

  • A. SysPcap
  • B. libpcap
  • C. BinPcap
  • D. WinPcap

Answer: B

NEW QUESTION 3
Which of the following NETSH commands for interface Internet protocol version 4 (IPv4) is used to delete a DNS server or all DNS servers from a list of DNS servers for a specified interface or for all interfaces?

  • A. disable dnsserver
  • B. alter dnsserver
  • C. delete dnsserver
  • D. remove dnsserver

Answer: C

NEW QUESTION 4
Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 domainbased network. Mark wants to block all NNTP traffic between the network and the Internet. How will he configure the network?

  • A. Disable anonymous logins in the NNTP configuration manage
  • B. Block port 25 by configuring the firewal
  • C. Block port 119 by configuring the firewal
  • D. Block TCP port 80 by configuring the firewal

Answer: C

NEW QUESTION 5
Which of the following is a form of cheating or copying someone else's work or idea without acknowledging the source?

  • A. Patent
  • B. Turnitin
  • C. Copyright
  • D. Plagiarism

Answer: D

NEW QUESTION 6
Which of the following terms describes an attempt to transfer DNS zone data?

  • A. Reconnaissance
  • B. Encapsulation
  • C. Dumpster diving
  • D. Spam

Answer: A

NEW QUESTION 7
Which of the following attacks is designed to deduce the brand and/or version of an operating system or application?

  • A. Vulnerability assessment
  • B. Banner grabbing
  • C. OS fingerprinting
  • D. Port scanning

Answer: B

NEW QUESTION 8
Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?
Each correct answer represents a part of the solution. Choose all that apply.

  • A. Text Semagrams
  • B. Linguistic steganography
  • C. Technical steganography
  • D. Perceptual masking

Answer: AB

NEW QUESTION 9
Which of the following is an example of penetration testing?

  • A. Implementing HIDS on a computer
  • B. Simulating an actual attack on a network
  • C. Implementing NIDS on a network
  • D. Configuring firewall to block unauthorized traffic

Answer: B

NEW QUESTION 10
Which of the following methods is a behavior-based IDS detection method?

  • A. Knowledge-based detection
  • B. Protocol detection
  • C. Statistical anomaly detection
  • D. Pattern matching detection

Answer: C

NEW QUESTION 11
Which of the following files records all driver installations after the system has booted?

  • A. setupapi.com
  • B. recdriver.log
  • C. drivinst.log
  • D. setupapi.log

Answer: D

NEW QUESTION 12
Which of the following firewalls inspects the actual contents of packets?

  • A. Application-level firewall
  • B. Stateful inspection firewall
  • C. Packet filtering firewall
  • D. Circuit-level firewall

Answer: A

NEW QUESTION 13
Which of the following utilities produces the output shown in the image below?
GCIA dumps exhibit

  • A. IPCONFIG
  • B. PING
  • C. PATHPING
  • D. TRACERT

Answer: B

NEW QUESTION 14
Which of the following firewalls keeps track of the state of network connections traveling across the network?

  • A. Stateful firewall
  • B. Application-level firewall
  • C. Packet filtering firewall
  • D. Circuit-level firewall

Answer: A

NEW QUESTION 15
You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server
2008 network environment. The servers on the network run Windows Server 2008 R2. All client computers on the network run Windows 7 Ultimate. You have configured DirectAccess feature on the laptop of few sales managers so that they can access corporate network from remote locations. Their laptops run Windows 7 Ultimate. Which of the following options does the DirectAccess use to keep data safer while traveling through travels public networks?

  • A. IPv6-over-IPsec
  • B. IPSec-over-IPv4
  • C. VPN
  • D. SSL

Answer: A

NEW QUESTION 16
Which method would provide the highest level of protection for all data transmitted on the internal network only? (Click the Exhibit button on the toolbar to see the case study.)

  • A. IPSec tunnel mode
  • B. SSL
  • C. PPTP
  • D. SMB
  • E. IPSec transport mode

Answer: E

NEW QUESTION 17
Which of the following standard file formats is used by Apple's iPod to store contact information?

  • A. HFS+
  • B. vCard
  • C. FAT32
  • D. hCard

Answer: B

NEW QUESTION 18
Which of the following tools are used to determine the hop counts of an IP packet?
Each correct answer represents a complete solution. Choose two.

  • A. TRACERT
  • B. Ping
  • C. IPCONFIG
  • D. Netstat

Answer: AB

NEW QUESTION 19
Which of the following tools is an open source protocol analyzer that can capture traffic in real time?

  • A. Netresident
  • B. Snort
  • C. Wireshark
  • D. NetWitness

Answer: C

NEW QUESTION 20
Which of the following organizations is dedicated to computer security research and information sharing?

  • A. FBI
  • B. NIPC
  • C. Honeynet Project
  • D. IEEE

Answer: C

NEW QUESTION 21
......

Recommend!! Get the Full GCIA dumps in VCE and PDF From DumpSolutions.com, Welcome to Download: https://www.dumpsolutions.com/GCIA-dumps/ (New 508 Q&As Version)