Examcollection offers free demo for GCIA exam. "GIAC Certified Intrusion Analyst", also known as GCIA exam, is a GIAC Certification. This set of posts, Passing the GIAC GCIA exam, will help you answer those questions. The GCIA Questions & Answers covers all the knowledge points of the real exam. 100% real GIAC GCIA exams and revised by experts!
Free demo questions for GIAC GCIA Exam Dumps Below:
NEW QUESTION 1
John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?
Each correct answer represents a complete solution. Choose all that apply.
Answer: ABC
NEW QUESTION 2
Which of the following commands is used to refresh the Master Boot Record (MBR) in MS-DOS?
Answer: B
NEW QUESTION 3
Which of the following is not a Denial of Service (DoS) attack?
Answer: B
NEW QUESTION 4
Which of the following snort keywords is used to match a defined payload value?
Answer: A
NEW QUESTION 5
Which of the following firewalls depends on the three-way handshake of the TCP protocol?
Answer: A
NEW QUESTION 6
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate and examine drive image of a compromised system, which is suspected to be used in cyber crime. Adam uses Forensic Sorter to sort the contents of hard drive in different categories. Which of the following type of image formats is NOT supported by Forensic Sorter?
Answer: D
NEW QUESTION 7
You work as a Network Administrator for NetTech Inc. You want to know the local IP address, subnet mask, and default gateway of a NIC in a Windows 98 computer. Which of the following utilities will you use to accomplish this ?
Answer: B
NEW QUESTION 8
You work as a Network Administrator for Tech Perfect Inc. Your company has a Windows 2000-based network. You want to verify the connectivity of a host in the network. Which of the following utilities will you use?
Answer: A
NEW QUESTION 9
For a host to have successful Internet communication, which of the following network protocols are required? You should assume that the users will not manually configure the computer in anyway and that the measure of success will be whether the user can access Web sites after powering the computer and logging on.
Each correct answer represents a complete solution. Choose all that apply.
Answer: ABC
NEW QUESTION 10
Which of the following is the default port for DNS zone transfer?
Answer: D
NEW QUESTION 11
Which of the following statements are true about snort?
Each correct answer represents a complete solution. Choose all that apply.
Answer: ABD
NEW QUESTION 12
Which of the following partitions contains the system files that are used to start the operating system?
Answer: B
NEW QUESTION 13
Which of the following is the default port for Simple Network Management Protocol (SNMP)?
Answer: D
NEW QUESTION 14
Sandra, an expert computer user, hears five beeps while booting her computer that has AMI BIOS; and after that her computer stops responding. Sandra knows that during booting process POST produces different beep codes for different types of errors. Which of the following errors refers to this POST beep code?
Answer: C
NEW QUESTION 15
Web applications are accessed by communicating over TCP ports via an IP address. Choose the two most common Web Application TCP ports and their respective protocol names.
Each correct answer represents a complete solution. Choose two.
Answer: BC
NEW QUESTION 16
Which of the following password cracking tools can work on the Unix and Linux environment?
Answer: B
NEW QUESTION 17
Which of the following image file formats uses a lossy data compression technique?
Answer: B
NEW QUESTION 18
Which of the following is designed to protect the Internet resolvers (clients) from forged DNS data that are created by the DNS cache poisoning?
Answer: C
NEW QUESTION 19
John works as a Network Security Administrator for NetPerfect Inc. The manager of the company has told John that the company's phone bill has increased drastically. John suspects that the company's phone system has been cracked by a malicious hacker. Which attack is used by malicious hackers to crack the phone system?
Answer: B
NEW QUESTION 20
Which of the following DOS commands is used to configure network protocols?
Answer: A
NEW QUESTION 21
......
P.S. Certshared now are offering 100% pass ensure GCIA dumps! All GCIA exam questions have been updated with correct answers: https://www.certshared.com/exam/GCIA/ (508 New Questions)