getcertified4sure.com

100% Guarantee GIAC GCIA Dumps Questions Online




Want to know Actualtests GCIA Exam practice test features? Want to lear more about GIAC GIAC Certified Intrusion Analyst certification experience? Study Highest Quality GIAC GCIA answers to Update GCIA questions at Actualtests. Gat a success with an absolute guarantee to pass GIAC GCIA (GIAC Certified Intrusion Analyst) test on your first attempt.

Free demo questions for GIAC GCIA Exam Dumps Below:

NEW QUESTION 1
Which of the following OSI layers is responsible for protocol conversion, data encryption/decryption, and data compression?

  • A. Network layer
  • B. Data-link layer
  • C. Presentation layer
  • D. Transport layer

Answer: C

NEW QUESTION 2
Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses 'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Zero-day attack
  • B. Dictionary-based attack
  • C. Rainbow attack
  • D. Denial-of-service (DoS) attack
  • E. Brute force attack
  • F. Buffer-overflow attack
  • G. Password guessing
  • H. Social engineering

Answer: BCEGH

NEW QUESTION 3
Which of the following commands used in Linux to create bit-stream images?

  • A. ss
  • B. xcopy
  • C. dd
  • D. img

Answer: C

NEW QUESTION 4
Which of the following utilities is used to verify the existence of a host in a network?

  • A. IPCONFIG
  • B. NETSTAT
  • C. CHKDSK
  • D. PING

Answer: D

NEW QUESTION 5
John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based systems. A project has been assigned to John to track malicious hackers and to strengthen the company's security system. John configures a computer system to trick malicious hackers into thinking that it is the company's main server, which in fact is a decoy system to track hackers.
Which system is John using to track the malicious hackers?

  • A. Honeypot
  • B. Honeytokens
  • C. Intrusion Detection System (IDS)
  • D. Bastion host

Answer: A

NEW QUESTION 6
Which of the following Web attacks is performed by manipulating codes of programming languages such as SQL, Perl, Java present in the Web pages?

  • A. Command injection attack
  • B. Code injection attack
  • C. Cross-Site Request Forgery
  • D. Cross-Site Scripting attack

Answer: B

NEW QUESTION 7
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based routed network. You have recently come to know about the Slammer worm, which attacked computers in 2003 and doubled the number of infected hosts every 9 seconds or so. Slammer infected 75000 hosts in the first 10 minutes of the attack. To mitigate such security threats, you want to configure security tools on the network. Which of the following tools will you use?

  • A. Intrusion Prevention Systems
  • B. Firewall
  • C. Intrusion Detection Systems
  • D. Anti-x

Answer: A

NEW QUESTION 8
Which of the following is not a valid Failed Logon EventID?

  • A. 535
  • B. 536
  • C. 534
  • D. 533

Answer: B

NEW QUESTION 9
CORRECT TEXT
Fill in the blank with the appropriate term.
___________ is a technique used to make sure that incoming packets are actually from the networks that they claim to be from.

  • A. Ingress filtering

Answer: A

NEW QUESTION 10
Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?

  • A. Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer
  • B. Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer
  • C. application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer
  • D. Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer

Answer: A

NEW QUESTION 11
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

  • A. Signature-based
  • B. Network-based
  • C. File-based
  • D. Anomaly-based

Answer: D

NEW QUESTION 12
Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?

  • A. DOS boot disk
  • B. EnCase with a hardware write blocker
  • C. Linux Live CD
  • D. Secure Authentication for EnCase (SAFE)

Answer: D

NEW QUESTION 13
Sandra, an expert computer user, hears five beeps while booting her computer that has AMI BIOS; and after that her computer stops responding. Sandra knows that during booting process POST produces different beep codes for different types of errors. Which of the following errors refers to this POST beep code?

  • A. Cache memory test failed
  • B. Mother board timer not operational
  • C. Display memory error
  • D. Processor failure

Answer: D

NEW QUESTION 14
Which of the following is used for remote file access by UNIX/Linux systems?

  • A. Server Message Block (SMB)
  • B. Network File System (NFS)
  • C. Common Internet File System (CIFS)
  • D. NetWare Core Protocol (NCP)

Answer: B

NEW QUESTION 15
Which of the following information must the fragments carry for the destination host to reassemble them back to the original unfragmented state?
Each correct answer represents a complete solution. Choose all that apply.

  • A. MF flag
  • B. Offset field
  • C. MAC address
  • D. Length of the data
  • E. IP address
  • F. IP identification number

Answer: ABDF

NEW QUESTION 16
Which of the following attacks involves multiple compromised systems to attack a single target?

  • A. Brute force attack
  • B. DDoS attack
  • C. Replay attack
  • D. Dictionary attack

Answer: B

NEW QUESTION 17
Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following switches will she use with CHKDSK command to accomplish the task?

  • A. CHKDSK /I
  • B. CHKDSK /R /F
  • C. CHKDSK /C /L
  • D. CHKDSK /V /X

Answer: B

NEW QUESTION 18
Which of the following is NOT the functional area of a forensic laboratory?

  • A. Network facilities
  • B. Evidence storage
  • C. Administrative area
  • D. Research area

Answer: D

NEW QUESTION 19
Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc. Which of the following types of Cross-Site Scripting attack Ryan intends to do?

  • A. Non persistent
  • B. SAX
  • C. Persistent
  • D. Document Object Model (DOM)

Answer: C

NEW QUESTION 20
What is the order of the extension headers that is followed by IPv6?

  • A. Destination Options (first), Routing, IPv6 header, Hop-by-Hop, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payloa
  • B. Routing, Hop-by-Hop, Destination Options (first), Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payloa
  • C. Fragment, Routing, Hop-by-Hop, Destination Options (first), Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payloa
  • D. IPv6 header, Hop-by-Hop, Destination Options (first), Routing, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payloa

Answer: D

NEW QUESTION 21
......

Thanks for reading the newest GCIA exam dumps! We recommend you to try the PREMIUM Certleader GCIA dumps in VCE and PDF here: https://www.certleader.com/GCIA-dumps.html (508 Q&As Dumps)