getcertified4sure.com

The Secret Of GIAC GCIA Vce




Proper study guides for Regenerate GIAC GIAC Certified Intrusion Analyst certified begins with GIAC GCIA preparation products which designed to deliver the Free GCIA questions by making you pass the GCIA test at your first time. Try the free GCIA demo right now.

Free GCIA Demo Online For GIAC Certifitcation:

NEW QUESTION 1
SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Blowfish
  • B. IDEA
  • C. DES
  • D. RC4

Answer: ABC

NEW QUESTION 2
Which of the following statements best describes the string matching method of signature analysis?

  • A. String matching searches specific strings that may indicate an attac
  • B. String matching examines multiple fields from different protocols, such as source address, destination port, or TCP flag
  • C. In string matching, each packet is wrapped in predefined layers of different protocol
  • D. In string matching, an incoming packet is compared, byte by byte, with a single signature, a string of cod

Answer: D

NEW QUESTION 3
You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?

  • A. Enable verbose logging on the firewall
  • B. Install a network-based IDS
  • C. Install a DMZ firewall
  • D. Install a host-based IDS

Answer: B

NEW QUESTION 4
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 Active Directory-based single forest multiple domain IPv4 network. All the DNS servers on the network run Windows Server 2008. The users in the network use NetBIOS name to connect network application on the network. You have migrated the network to IPv6-enabled network. Now you want to enable DNS Server to perform lookups in GlobalNames Zone. Which of the following commands will you use to accomplish the task?

  • A. Dnscmd <server name> /config /enableglobalnames 1
  • B. Dnscmd <server name> /config /enableglobalnamessupport 0
  • C. Dnscmd <server name> /config /enableglobalnamessupport 1
  • D. Dnscmd <server name> /config /globalnamesqueryorder 0

Answer: C

NEW QUESTION 5
Which of the following is an asymmetric encryption algorithm?

  • A. Blowfish
  • B. RC5
  • C. Diffie-Hellman
  • D. RC4

Answer: C

NEW QUESTION 6
You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion detection on the server. You find that the different types of attacks on the Intrusion Detection tab page of the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?

  • A. The PPTP through ISA firewall check box on the PPTP tab page of the IP Packet Filters Properties dialog box is not enable
  • B. The Enable IP routing check box on the General tab page of the IP Packet Filters Properties dialog box is not selecte
  • C. The Log packets from Allow filters check box on the Packet Filters tab page of the IP Packet Filters Properties dialog box is not enable
  • D. The Enable Intrusion detection check box on the General tab page of the IP Packet Filters Properties dialog box is not selecte

Answer: D

NEW QUESTION 7
Which of the following is used to detect the bad sectors in a hard disk under Linux environment?

  • A. Badblocks
  • B. CheckDisk
  • C. ScanDisk
  • D. CHKDSK

Answer: A

NEW QUESTION 8
Which of the following fields of the IPv6 header is similar to the TTL field of IPv4?

  • A. Hop Limit
  • B. Next Header
  • C. Flow Label
  • D. Traffic Class

Answer: A

NEW QUESTION 9
Which of the following is not a function of the Snort utility?

  • A. Routing messages
  • B. Packet sniffing
  • C. Packet logging
  • D. Intrusion detection

Answer: A

NEW QUESTION 10
Which of the following is the best method of accurately identifying the services running on a victim host?

  • A. Use of hit and trial method to guess the services and ports of the victim hos
  • B. Use of a port scanner to scan each port to confirm the services runnin
  • C. Use of a vulnerability scanner to try to probe each port to verify which service is runnin
  • D. Use of the manual method of telnet to each of the open port

Answer: D

NEW QUESTION 11
Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc.
Which of the following types of Cross-Site Scripting attack Ryan intends to do?

  • A. Document Object Model (DOM)
  • B. Non persistent
  • C. SAX
  • D. Persistent

Answer: D

NEW QUESTION 12
Which of the following ports can be used for IP spoofing?

  • A. NNTP 119
  • B. POP 110
  • C. Rlogin 513
  • D. Whois 43

Answer: C

NEW QUESTION 13
Mark works as the Network Administrator of a Windows 2000 based network. The network has a DNS server installed. He experiences host name resolution problems on the network. In order to rectify the situation, he wants to troubleshoot DNS name resolution problems on the network.
Which of the following tools will he use to do this?

  • A. NSLOOKUP
  • B. IPCONFIG
  • C. NBTSTAT
  • D. NETSTAT

Answer: A

NEW QUESTION 14
Which of the following is an exact duplicate of computer's hard drive?

  • A. system image
  • B. bit-stream image
  • C. data image
  • D. drive image

Answer: B

NEW QUESTION 15
Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?
Each correct answer represents a complete solution. Choose three.

  • A. These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized acces
  • B. These are the threats that originate from within the organizatio
  • C. These are the threats intended to flood a network with large volumes of access request
  • D. These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Interne

Answer: ACD

NEW QUESTION 16
Which of the following UDP ports are used by the Simple Network Management Protocol (SNMP)? Each correct answer represents a complete solution. Choose two.

  • A. UDP port 69
  • B. UDP port 161
  • C. UDP port 137
  • D. UDP port 162

Answer: BD

NEW QUESTION 17
Which of the following is the primary TCP/IP protocol used to transfer text and binary files over the Internet?

  • A. PPTP
  • B. SNMP
  • C. FTP
  • D. SMTP

Answer: C

NEW QUESTION 18
Which of the following is computed from an arbitrary block of digital data for the purpose of detecting accidental errors?

  • A. Hash filter
  • B. Checksum
  • C. Hash buster
  • D. Firewall

Answer: B

NEW QUESTION 19
You are using a Windows-based sniffer named ASniffer to record the data traffic of a network. You have extracted the following IP Header information of a randomly chosen packet from the sniffer's log:
45 00 00 28 00 00 40 00 29 06 43 CB D2 D3 82 5A 3B 5E AA 72
Which of the following TTL decimal values and protocols are being carried by the IP Header of this packet?

  • A. 41, UDP
  • B. 16, ICMP
  • C. 41, TCP
  • D. 16, UDP

Answer: C

NEW QUESTION 20
Which of the following algorithms is used as a default algorithm for ESP extension header in IPv6?

  • A. Propagating Cipher Block Chaining (PCBC) Mode
  • B. Cipher Block Chaining (CBC) Mode
  • C. Electronic Codebook (ECB) Mode
  • D. Cipher Feedback (CFB) Mode

Answer: B

NEW QUESTION 21
......

P.S. 2passeasy now are offering 100% pass ensure GCIA dumps! All GCIA exam questions have been updated with correct answers: https://www.2passeasy.com/dumps/GCIA/ (508 New Questions)