getcertified4sure.com

Up To The Immediate Present GIAC Certified Intrusion Analyst GCIA Free Samples




Want to know Certleader GCIA Exam practice test features? Want to lear more about GIAC GIAC Certified Intrusion Analyst certification experience? Study 100% Correct GIAC GCIA answers to Regenerate GCIA questions at Certleader. Gat a success with an absolute guarantee to pass GIAC GCIA (GIAC Certified Intrusion Analyst) test on your first attempt.

Also have GCIA free dumps questions for you:

NEW QUESTION 1
What is the maximum size of an IP datagram for Ethernet?

  • A. 1200 bytes
  • B. 1024 bytes
  • C. 1500 bytes
  • D. 4500 bytes

Answer: C

NEW QUESTION 2
Which of the following ports is used by e-mail clients to send request to connect to the server?

  • A. Port 23
  • B. Port 21
  • C. Port 25
  • D. Port 20

Answer: C

NEW QUESTION 3
Which of the following honeypots is a low-interaction honeypot and is used by companies or corporations for capturing limited information about malicious hackers?

  • A. Production honeypot
  • B. Research honeypot
  • C. Honeynet
  • D. Honeyfarm

Answer: A

NEW QUESTION 4
The Intrusion Detection System (IDS) instructs the firewall to reject any request from a particular IP address if the network is repeatedly attacked from this address. What is this action known as?

  • A. Spoofing
  • B. Sending deceptive e-mails
  • C. Network Configuration Changes
  • D. Shunning
  • E. Logging
  • F. Sending notifications

Answer: C

NEW QUESTION 5
You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based network. The network is connected to the Internet through a firewall. A user complains that he is unable to access the abc.com site. However, he can access all other sites. Which of the following tools will help you diagnose the problem?

  • A. IPCONFIG
  • B. ROUTE
  • C. TELNET
  • D. TRACERT

Answer: D

NEW QUESTION 6
Which of the following is the process of categorizing attack alerts produced from an IDS in order to distinguish false positives from actual attacks?

  • A. Alarm filtering
  • B. Confidence value
  • C. Reactive system
  • D. Site policy

Answer: A

NEW QUESTION 7
You are a professional Computer Hacking forensic investigator. You have been called to collect the evidences of Buffer Overflows or Cookie snooping attack. Which of the following logs will you review to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Event logs
  • B. Program logs
  • C. Web server logs
  • D. System logs

Answer: ABD

NEW QUESTION 8
Which of the following Windows XP system files handles memory management, I/O operations, and interrupts?

  • A. Ntoskrnl.exe
  • B. Advapi32.dll
  • C. Kernel32.dll
  • D. Win32k.sys

Answer: C

NEW QUESTION 9
Which of the following protocols is used to translate IP addresses to Ethernet addresses?

  • A. Border Gateway Protocol (BGP)
  • B. Routing Information Protocol (RIP)
  • C. Address Resolution Protocol (ARP)
  • D. Internet Control Message Protocol (ICMP)

Answer: C

NEW QUESTION 10
Which of the following is the correct order of loading system files into the main memory of the system, when the computer is running on Microsoft's Windows XP operating system?

  • A. NTLDR, BOOT.ini, HAL.dll, NTDETECT.com, NTOSKRNL.exe
  • B. BOOT.ini, HAL.dll, NTDETECT.com, NTLDR, NTOSKRNL.exe
  • C. NTLDR, BOOT.ini, HAL.dll, NTDETECT.com, NTOSKRNL.exe
  • D. NTLDR, BOOT.ini, NTDETECT.com, HAL.dll, NTOSKRNL.exe

Answer: D

NEW QUESTION 11
What netsh command should be run to enable IPv6 routing?
Each correct answer represents a part of the solution. Choose two.

  • A. netsh interface IPv6 show interface
  • B. netsh interface IPv6 add routes
  • C. netsh interface IPv6 set interface
  • D. netsh interface IPv6 add address

Answer: BC

NEW QUESTION 12
When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.

  • A. True negative
  • B. True positive
  • C. False negative
  • D. False positive

Answer: D

NEW QUESTION 13
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. The network contains a Windows Server 2008 Core computer. You want to install the DNS server role on the Windows Server 2008 Core computer. Which of the following commands will you use to accomplish the task?

  • A. start /w ocsetup DnsServercorerole
  • B. net start "dns server"
  • C. start /w ocsetup DNS-Server-Core-Role
  • D. start /w ocsetup DnsServer

Answer: C

NEW QUESTION 14
Which of the following is the default port for Simple Network Management Protocol (SNMP)?

  • A. TCP port 110
  • B. TCP port 25
  • C. TCP port 80
  • D. UDP port 161

Answer: D

NEW QUESTION 15
Which of the following is a hardware/software platform that is designed to analyze, detect, and report on security related events. NIPS is designed to inspect traffic and based on its configuration or security policy, it can drop the malicious traffic?

  • A. NIPS
  • B. HIDS
  • C. NIDS
  • D. HIPS

Answer: A

NEW QUESTION 16
Which of the following types of Intrusion detection systems (IDS) is used for port mirroring?

  • A. Port address-based IDS
  • B. Network-based IDS (NIDS)
  • C. Host-based IDS (HIDS)
  • D. Anomaly-based IDS

Answer: B

NEW QUESTION 17
Which of the following commands is used to flush the destination cache for IPv6 interface?

  • A. netsh interface ipv6 reset cache
  • B. netsh interface ipv6 delete destinationcache
  • C. netsh interface ipv6 flush destinationcache
  • D. netsh interface ipv6 remove destinationcache

Answer: B

NEW QUESTION 18
What is the size of a subnet in IPv6?

  • A. 264 addresses
  • B. 232 addresses
  • C. 262 addresses
  • D. 2128 addresses

Answer: A

NEW QUESTION 19
Which of the following is an example of a social engineering attack?

  • A. Phishing
  • B. Man-in-the-middle attack
  • C. Browser Sniffing
  • D. E-mail bombing

Answer: A

NEW QUESTION 20
Which of the following ports is used by NTP for communication?

  • A. 143
  • B. 123
  • C. 161
  • D. 53

Answer: B

NEW QUESTION 21
......

100% Valid and Newest Version GCIA Questions & Answers shared by Dumps-hub.com, Get Full Dumps HERE: https://www.dumps-hub.com/GCIA-dumps.html (New 508 Q&As)