Testking GCIA Questions are updated and all GCIA answers are verified by experts. Once you have completely prepared with our GCIA exam prep kits you will be ready for the real GCIA exam without a problem. We have Abreast of the times GIAC GCIA dumps study guide. PASSED GCIA First attempt! Here What I Did.
Online GIAC GCIA free dumps demo Below:
NEW QUESTION 1
Which of the following is an open-source Web server scanner that tests Web servers for dangerous files/CGIs, outdated server software?
Answer: D
NEW QUESTION 2
You work as a Network Administrator for Tech Perfect Inc. The company has a TCP/IP-based network. You want to know the current TCP/IP network configuration settings, DHCP server IP address, and DHCP lease expiration date of your network.
Which of the following utilities will you use?
Answer: D
NEW QUESTION 3
You are planning DNS configuration for your company. You decide to configure an Active Directory integrated DNS.
Which of the following are the benefits of Active Directory integrated DNS configuration?
Each correct answer represents a complete solution. Choose all that apply.
Answer: ABD
NEW QUESTION 4
Steve works as a Network Administrator for Blue Tech Inc. All client computers in the company run the Windows Vista operating system. He often travels long distances on official duty. While traveling, he connects to the office server through his laptop by using remote desktop connection.
He wants to run an application that is available on the server of the company. When he connects to the server, he gets a message that the connection is blocked by the firewall. He returns to his office to resolve the issue. He opens the Windows Firewall Settings dialog box. What actions should he perform in the dialog box given below to accomplish the task?
[MISSING]
Answer: A
NEW QUESTION 5
Which of the following attacks is used to hack simple alphabetical passwords?
Answer: A
NEW QUESTION 6
Which of the following password cracking attacks is based on a pre-calculated hash table to retrieve plain text passwords?
Answer: D
NEW QUESTION 7
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domainbased network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you apply Windows firewall setting to the computers on the network. Now, you are troubleshooting a connectivity problem that might be caused by Windows firewall. What will you do to identify connections that Windows firewall allows or blocks?
Answer: C
NEW QUESTION 8
Which of the following statements are true about snort?
Each correct answer represents a complete solution. Choose all that apply.
Answer: ABD
NEW QUESTION 9
Which of the following utilities provides an efficient way to give specific users permission to use specific system commands at the root level of a Linux operating system?
Answer: B
NEW QUESTION 10
Which of the following limits the number of packets seen by tcpdump?
Answer: C
NEW QUESTION 11
You work as a Network Administrator for Rick International. The company has a TCP/IP-based network. A user named Kevin wants to set an SSH terminal at home to connect to the company's network. You have to configure your company's router for it. By default, which of the following standard ports does the SSH protocol use for connection?
Answer: D
NEW QUESTION 12
Which of the following log files are used to collect evidences before taking the bit-stream image of the BlackBerry?
Each correct answer represents a complete solution. Choose all that apply.
Answer: BCD
NEW QUESTION 13
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of the mobile phone. Which of the following tools is Adam using?
Answer: D
NEW QUESTION 14
You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You have configured a WAN link for the network. You are facing connectivity problem across the WAN link. What will be your first step in troubleshooting the issue?
Answer: B
NEW QUESTION 15
Fill in the blank with the appropriate facts regarding IP version 6 (IPv6).
IP addressing version 6 uses_____ -bit address. Its____ IP address assigned to a single host allows the host to send and receive data.
Answer: A
NEW QUESTION 16
Which of the following is a form of cheating or copying someone else's work or idea without acknowledging the source?
Answer: D
NEW QUESTION 17
Which of the following firewalls keeps track of the state of network connections traveling across the network?
Answer: A
NEW QUESTION 18
You work as a system administrator for BlueSkwer.com. You are using IPv6 on all computers. You want to ensure that you do not need to manually configure the IPv6 addresses. You want to take advantage of the router discovery features. For router discovery to work properly, what is needed?
Answer: A
NEW QUESTION 19
Adam works as a Network Administrator for CertLeader Inc. He wants to prevent the network from
DOS attacks. Which of the following is most useful against DOS attacks?
Answer: C
NEW QUESTION 20
How many bits does IPv6 use in IP addresses?
Answer: D
NEW QUESTION 21
......
100% Valid and Newest Version GCIA Questions & Answers shared by Surepassexam, Get Full Dumps HERE: https://www.surepassexam.com/GCIA-exam-dumps.html (New 508 Q&As)