getcertified4sure.com

Top Tips Of Updated GCIA Test Question




Examcollection offers free demo for GCIA exam. "GIAC Certified Intrusion Analyst", also known as GCIA exam, is a GIAC Certification. This set of posts, Passing the GIAC GCIA exam, will help you answer those questions. The GCIA Questions & Answers covers all the knowledge points of the real exam. 100% real GIAC GCIA exams and revised by experts!

Free demo questions for GIAC GCIA Exam Dumps Below:

NEW QUESTION 1
John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Dictionary attack
  • B. Hybrid attack
  • C. Brute Force attack
  • D. Rule based attack

Answer: ABC

NEW QUESTION 2
Which of the following commands is used to refresh the Master Boot Record (MBR) in MS-DOS?

  • A. CHKDSK
  • B. FDISK
  • C. XDISK
  • D. FORMAT

Answer: B

NEW QUESTION 3
Which of the following is not a Denial of Service (DoS) attack?

  • A. Smurf attack
  • B. Code injection attack
  • C. Ping of Death attack
  • D. Teardrop attack

Answer: B

NEW QUESTION 4
Which of the following snort keywords is used to match a defined payload value?

  • A. content
  • B. ttl
  • C. id
  • D. msg

Answer: A

NEW QUESTION 5
Which of the following firewalls depends on the three-way handshake of the TCP protocol?

  • A. Stateful firewall
  • B. Endian firewall
  • C. Proxy-based firewall
  • D. Packet filter firewall

Answer: A

NEW QUESTION 6
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate and examine drive image of a compromised system, which is suspected to be used in cyber crime. Adam uses Forensic Sorter to sort the contents of hard drive in different categories. Which of the following type of image formats is NOT supported by Forensic Sorter?

  • A. EnCase image file
  • B. PFR image file
  • C. RAW image file
  • D. iso image file

Answer: D

NEW QUESTION 7
You work as a Network Administrator for NetTech Inc. You want to know the local IP address, subnet mask, and default gateway of a NIC in a Windows 98 computer. Which of the following utilities will you use to accomplish this ?

  • A. TRACERT
  • B. WINIPCFG
  • C. NETSTAT
  • D. FDISK

Answer: B

NEW QUESTION 8
You work as a Network Administrator for Tech Perfect Inc. Your company has a Windows 2000-based network. You want to verify the connectivity of a host in the network. Which of the following utilities will you use?

  • A. PING
  • B. TELNET
  • C. NETSTAT
  • D. TRACERT

Answer: A

NEW QUESTION 9
For a host to have successful Internet communication, which of the following network protocols are required? You should assume that the users will not manually configure the computer in anyway and that the measure of success will be whether the user can access Web sites after powering the computer and logging on.
Each correct answer represents a complete solution. Choose all that apply.

  • A. DNS
  • B. HTTP/HTTPS
  • C. DHCP
  • D. NTP

Answer: ABC

NEW QUESTION 10
Which of the following is the default port for DNS zone transfer?

  • A. Port 21
  • B. Port 80
  • C. Port 23
  • D. Port 53

Answer: D

NEW QUESTION 11
Which of the following statements are true about snort?
Each correct answer represents a complete solution. Choose all that apply.

  • A. It develops a new signature to find vulnerabilitie
  • B. It detects and alerts a computer user when it finds threats such as buffer overflows, stealth port scans, CGI attacks, SMB probes and NetBIOS queries, NMAP and other port scanners, well-known backdoors and system vulnerabilities, and DDoS client
  • C. It encrypts the log file using the 256 bit AES encryption scheme algorith
  • D. It is used as a passive trap to record the presence of traffic that should not be found on a network, such as NFS or Napster connection

Answer: ABD

NEW QUESTION 12
Which of the following partitions contains the system files that are used to start the operating system?

  • A. Secondary partition
  • B. Boot partition
  • C. Primary partition
  • D. System partition

Answer: B

NEW QUESTION 13
Which of the following is the default port for Simple Network Management Protocol (SNMP)?

  • A. TCP port 110
  • B. TCP port 25
  • C. TCP port 80
  • D. UDP port 161

Answer: D

NEW QUESTION 14
Sandra, an expert computer user, hears five beeps while booting her computer that has AMI BIOS; and after that her computer stops responding. Sandra knows that during booting process POST produces different beep codes for different types of errors. Which of the following errors refers to this POST beep code?

  • A. Display memory error
  • B. Cache memory test failed
  • C. Processor failure
  • D. Mother board timer not operational

Answer: C

NEW QUESTION 15
Web applications are accessed by communicating over TCP ports via an IP address. Choose the two most common Web Application TCP ports and their respective protocol names.
Each correct answer represents a complete solution. Choose two.

  • A. TCP Port 443 / S-HTTP or SSL
  • B. TCP Port 443 / HTTPS or SSL
  • C. TCP Port 80 / HTTP
  • D. TCP Port 80 / HTTPS or SSL

Answer: BC

NEW QUESTION 16
Which of the following password cracking tools can work on the Unix and Linux environment?

  • A. Brutus
  • B. John the Ripper
  • C. Cain and Abel
  • D. Ophcrack

Answer: B

NEW QUESTION 17
Which of the following image file formats uses a lossy data compression technique?

  • A. GIF
  • B. JPG
  • C. PNG
  • D. TIF

Answer: B

NEW QUESTION 18
Which of the following is designed to protect the Internet resolvers (clients) from forged DNS data that are created by the DNS cache poisoning?

  • A. Split-horizon DNS
  • B. Stub resolver
  • C. Domain Name System Extension (DNSSEC)
  • D. BINDER

Answer: C

NEW QUESTION 19
John works as a Network Security Administrator for NetPerfect Inc. The manager of the company has told John that the company's phone bill has increased drastically. John suspects that the company's phone system has been cracked by a malicious hacker. Which attack is used by malicious hackers to crack the phone system?

  • A. Sequence++ attack
  • B. Phreaking
  • C. Man-in-the-middle attack
  • D. War dialing

Answer: B

NEW QUESTION 20
Which of the following DOS commands is used to configure network protocols?

  • A. netsh
  • B. netsvc
  • C. netstat
  • D. ipconfig

Answer: A

NEW QUESTION 21
......

P.S. Certshared now are offering 100% pass ensure GCIA dumps! All GCIA exam questions have been updated with correct answers: https://www.certshared.com/exam/GCIA/ (508 New Questions)