Exam Code: GCIA (Practice Exam Latest Test Questions VCE PDF)
Exam Name: GIAC Certified Intrusion Analyst
Certification Provider: GIAC
Free Today! Guaranteed Training- Pass GCIA Exam.
Free demo questions for GIAC GCIA Exam Dumps Below:
NEW QUESTION 1
You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network.
You want to know the statistics of each protocol installed on your computer. Which of the following commands will you use?
Answer: B
NEW QUESTION 2
In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?
Answer: A
NEW QUESTION 3
John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He scans the We-are-secure server and gets the following result:
sysDescr.0 = STRING. "SunOS we-are-secure.com 4.1.3_U1 1 sun4m"
sysObjectID.0 = OID. enterprises.hp.nm.hpsystem.10.1.1
sysUpTime.0 = Timeticks: (156474552) 18 days, 12:00:09
sysContact.0 = STRING. ""
sysName.0 = STRING. "we-are-secure.com"
sysLocation.0 = STRING. ""
sysServices.0 = INTEGER: 6
Which of the following tools is John using to perform the scan?
Answer: A
NEW QUESTION 4
You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?
Answer: D
NEW QUESTION 5
Which of the following tools are used to determine the hop counts of an IP packet?
Each correct answer represents a complete solution. Choose two.
Answer: AB
NEW QUESTION 6
Which of the following utilities produces the output shown in the image below?
Answer: B
NEW QUESTION 7
Which of the following are not functions of the SNORT application?
Each correct answer represents a complete solution. Choose two.
Answer: BC
NEW QUESTION 8
What is the function of PING LOCALHOST command?
Answer: D
NEW QUESTION 9
Peter works as a professional Computer Hacking Forensic Investigator for eLaw-Suit law firm. He is working on a case of a cyber crime. Peter knows that the good investigative report should not only communicate the relevant facts, but also present expert opinion. This report should not include the cases in which the expert acted as a lay witness. Which of the following type of witnesses is a lay witness?
Answer: D
NEW QUESTION 10
Which of the following file systems supports the hot fixing feature?
Answer: C
NEW QUESTION 11
Which of the following classes refers to the fire involving electricity?
Answer: D
NEW QUESTION 12
Which of the following is used as a default port by the TELNET utility?
Answer: C
NEW QUESTION 13
What is the maximum size of an IP datagram for Ethernet?
Answer: D
NEW QUESTION 14
Which of the following proxy servers can be used for spamming?
Answer: C
NEW QUESTION 15
Which of the following is a checksum algorithm?
Answer: C
NEW QUESTION 16
You work as a System Administrator for McNeil Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. Your network is configured for IPv6 IP addressing. Which of the following commands will you use to test TCP/IP connectivity?
Answer: A
NEW QUESTION 17
Rick works as a Computer Forensic Investigator for BlueWells Inc. He has been informed that some confidential information is being leaked out by an employee of the company. Rick suspects that someone is sending the information through email. He checks the emails sent by some employees to other networks. Rick finds out that Sam, an employee of the Sales department, is continuously sending text files that contain special symbols, graphics, and signs. Rick suspects that Sam is using the Steganography technique to send data in a disguised form. Which of the following techniques is Sam using?
Each correct answer represents a part of the solution. Choose all that apply.
Answer: AB
NEW QUESTION 18
Which of the following would allow you to automatically close connections or restart a server or service when a DoS attack is detected?
Answer: A
NEW QUESTION 19
Which of the following tools is used to detect spam email without checking the content?
Answer: C
NEW QUESTION 20
Which of the following techniques is used to log network traffic?
Answer: D
NEW QUESTION 21
......
P.S. DumpSolutions.com now are offering 100% pass ensure GCIA dumps! All GCIA exam questions have been updated with correct answers: https://www.dumpsolutions.com/GCIA-dumps/ (508 New Questions)