Proper study guides for Regenerate GIAC GIAC Certified Intrusion Analyst certified begins with GIAC GCIA preparation products which designed to deliver the Free GCIA questions by making you pass the GCIA test at your first time. Try the free GCIA demo right now.
Free GCIA Demo Online For GIAC Certifitcation:
NEW QUESTION 1
SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?
Each correct answer represents a complete solution. Choose all that apply.
Answer: ABC
NEW QUESTION 2
Which of the following statements best describes the string matching method of signature analysis?
Answer: D
NEW QUESTION 3
You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?
Answer: B
NEW QUESTION 4
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. You have migrated the network to IPv6-enabled network. Now you want to enable DNS Server to perform lookups in GlobalNames Zone. Which of the following commands will you use to accomplish the task?
Answer: C
NEW QUESTION 5
Which of the following is an asymmetric encryption algorithm?
Answer: C
NEW QUESTION 6
You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion detection on the server. You find that the different types of attacks on the Intrusion Detection tab page of the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?
Answer: D
NEW QUESTION 7
Which of the following is used to detect the bad sectors in a hard disk under Linux environment?
Answer: A
NEW QUESTION 8
Which of the following fields of the IPv6 header is similar to the TTL field of IPv4?
Answer: A
NEW QUESTION 9
Which of the following is not a function of the Snort utility?
Answer: A
NEW QUESTION 10
Which of the following is the best method of accurately identifying the services running on a victim host?
Answer: D
NEW QUESTION 11
Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc.
Which of the following types of Cross-Site Scripting attack Ryan intends to do?
Answer: D
NEW QUESTION 12
Which of the following ports can be used for IP spoofing?
Answer: C
NEW QUESTION 13
Mark works as the Network Administrator of a Windows 2000 based network. The network has a DNS server installed. He experiences host name resolution problems on the network. In order to rectify the situation, he wants to troubleshoot DNS name resolution problems on the network.
Which of the following tools will he use to do this?
Answer: A
NEW QUESTION 14
Which of the following is an exact duplicate of computer's hard drive?
Answer: B
NEW QUESTION 15
Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?
Each correct answer represents a complete solution. Choose three.
Answer: ACD
NEW QUESTION 16
Which of the following UDP ports are used by the Simple Network Management Protocol (SNMP)? Each correct answer represents a complete solution. Choose two.
Answer: BD
NEW QUESTION 17
Which of the following is the primary TCP/IP protocol used to transfer text and binary files over the Internet?
Answer: C
NEW QUESTION 18
Which of the following is computed from an arbitrary block of digital data for the purpose of detecting accidental errors?
Answer: B
NEW QUESTION 19
You are using a Windows-based sniffer named ASniffer to record the data traffic of a network. You have extracted the following IP Header information of a randomly chosen packet from the sniffer's log:
45 00 00 28 00 00 40 00 29 06 43 CB D2 D3 82 5A 3B 5E AA 72
Which of the following TTL decimal values and protocols are being carried by the IP Header of this packet?
Answer: C
NEW QUESTION 20
Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?
Answer: B
NEW QUESTION 21
......
P.S. 2passeasy now are offering 100% pass ensure GCIA dumps! All GCIA exam questions have been updated with correct answers: https://www.2passeasy.com/dumps/GCIA/ (508 New Questions)