getcertified4sure.com

What Free GCIA Free Practice Exam Is




Testking GCIA Questions are updated and all GCIA answers are verified by experts. Once you have completely prepared with our GCIA exam prep kits you will be ready for the real GCIA exam without a problem. We have Abreast of the times GIAC GCIA dumps study guide. PASSED GCIA First attempt! Here What I Did.

Online GIAC GCIA free dumps demo Below:

NEW QUESTION 1
Which of the following is an open-source Web server scanner that tests Web servers for dangerous files/CGIs, outdated server software?

  • A. Nmap
  • B. Internet bot
  • C. Dsniff
  • D. Nikto

Answer: D

NEW QUESTION 2
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You want to know the current TCP/IP network configuration settings, DHCP server IP address, and DHCP lease expiration date of your network.
Which of the following utilities will you use?

  • A. PING
  • B. TELNET
  • C. TRACERT
  • D. IPCONFIG

Answer: D

NEW QUESTION 3
You are planning DNS configuration for your company. You decide to configure an Active Directory integrated DNS.
Which of the following are the benefits of Active Directory integrated DNS configuration?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Replication is more efficien
  • B. Multi-master environments are more fault toleran
  • C. Single-master environment is simpler to administe
  • D. It results in enhanced securit

Answer: ABD

NEW QUESTION 4
Steve works as a Network Administrator for Blue Tech Inc. All client computers in the company run the Windows Vista operating system. He often travels long distances on official duty. While traveling, he connects to the office server through his laptop by using remote desktop connection.
He wants to run an application that is available on the server of the company. When he connects to the server, he gets a message that the connection is blocked by the firewall. He returns to his office to resolve the issue. He opens the Windows Firewall Settings dialog box. What actions should he perform in the dialog box given below to accomplish the task?
[MISSING]

  • A.

Answer: A

NEW QUESTION 5
Which of the following attacks is used to hack simple alphabetical passwords?

  • A. Dictionary-based attack
  • B. Sniffing
  • C. Man-in-the-middle attack
  • D. Black hat attack

Answer: A

NEW QUESTION 6
Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords?

  • A. Brute Force attack
  • B. Hybrid attack
  • C. Dictionary attack
  • D. Rainbow attack

Answer: D

NEW QUESTION 7
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domainbased network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you apply Windows firewall setting to the computers on the network. Now, you are troubleshooting a connectivity problem that might be caused by Windows firewall. What will you do to identify connections that Windows firewall allows or blocks?

  • A. Configure Internet Protocol Security (IPSec).
  • B. Disable Windows firewall loggin
  • C. Enable Windows firewall loggin
  • D. Configure Network address translation (NAT).

Answer: C

NEW QUESTION 8
Which of the following statements are true about snort?
Each correct answer represents a complete solution. Choose all that apply.

  • A. It develops a new signature to find vulnerabilitie
  • B. It detects and alerts a computer user when it finds threats such as buffer overflows, stealth port scans, CGI attacks, SMB probes and NetBIOS queries, NMAP and other port scanners, well-known backdoors and system vulnerabilities, and DDoS client
  • C. It encrypts the log file using the 256 bit AES encryption scheme algorith
  • D. It is used as a passive trap to record the presence of traffic that should not be found on a network, such as NFS or Napster connection

Answer: ABD

NEW QUESTION 9
Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?

  • A. SSH
  • B. SUDO
  • C. Apache
  • D. Snort

Answer: B

NEW QUESTION 10
Which of the following limits the number of packets seen by tcpdump?

  • A. Sender filtering
  • B. IFilters
  • C. BPF-based filter
  • D. Recipient filtering

Answer: C

NEW QUESTION 11
You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?

  • A. 80
  • B. 21
  • C. 443
  • D. 22

Answer: D

NEW QUESTION 12
Which of the following log files are used to collect evidences before taking the bit-stream image of the BlackBerry?
Each correct answer represents a complete solution. Choose all that apply.

  • A. user history
  • B. Transmit/Receive
  • C. Radio status
  • D. Roam and Radio

Answer: BCD

NEW QUESTION 13
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of the mobile phone. Which of the following tools is Adam using?

  • A. FAU
  • B. FTK Imager
  • C. Galleta
  • D. Device Seizure

Answer: D

NEW QUESTION 14
You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You have configured a WAN link for the network. You are facing connectivity problem across the WAN link. What will be your first step in troubleshooting the issue?

  • A. Reinstall TCP/IP protoco
  • B. Check that the correct default gateway is se
  • C. Enable DN
  • D. Ensure that NetBEUI protocol is loade
  • E. Use the NETSTAT utility to view TCP/IP statistic

Answer: B

NEW QUESTION 15
Fill in the blank with the appropriate facts regarding IP version 6 (IPv6).
IP addressing version 6 uses_____ -bit address. Its____ IP address assigned to a single host allows the host to send and receive data.

  • A. IP addressing version 6 uses 128 -bit addres
  • B. Its unicast IP address assigned to a single host allows the host to send and receive dat

Answer: A

NEW QUESTION 16
Which of the following is a form of cheating or copying someone else's work or idea without acknowledging the source?

  • A. Patent
  • B. Turnitin
  • C. Copyright
  • D. Plagiarism

Answer: D

NEW QUESTION 17
Which of the following firewalls keeps track of the state of network connections traveling across the network?

  • A. Stateful firewall
  • B. Application-level firewall
  • C. Packet filtering firewall
  • D. Circuit-level firewall

Answer: A

NEW QUESTION 18
You work as a system administrator for BlueSkwer.com. You are using IPv6 on all computers. You want to ensure that you do not need to manually configure the IPv6 addresses. You want to take advantage of the router discovery features. For router discovery to work properly, what is needed?

  • A. A properly configured IPv6 router
  • B. Network load balancers
  • C. CAT 6 cables
  • D. Internet Explorer 8

Answer: A

NEW QUESTION 19
Adam works as a Network Administrator for CertLeader Inc. He wants to prevent the network from
DOS attacks. Which of the following is most useful against DOS attacks?

  • A. Internet bot
  • B. Honey Pot
  • C. SPI
  • D. Distributive firewall

Answer: C

NEW QUESTION 20
How many bits does IPv6 use in IP addresses?

  • A. 40 bits
  • B. 32 bits
  • C. 64 bits
  • D. 128 bits

Answer: D

NEW QUESTION 21
......

100% Valid and Newest Version GCIA Questions & Answers shared by Surepassexam, Get Full Dumps HERE: https://www.surepassexam.com/GCIA-exam-dumps.html (New 508 Q&As)