GCIA | Update GIAC Certified Intrusion Analyst GCIA Latest Exam

Actualtests offers free demo for GCIA exam. "GIAC Certified Intrusion Analyst", also known as GCIA exam, is a GIAC Certification. This set of posts, Passing the GIAC GCIA exam, will help you answer those questions. The GCIA Questions & Answers covers all the knowledge points of the real exam. 100% real GIAC GCIA exams and revised by experts!

Check GCIA free dumps before getting the full version:

NEW QUESTION 1
Which of the following is a signature-based intrusion detection system (IDS) ?

  • A. Snort
  • B. StealthWatch
  • C. RealSecure
  • D. Tripwire

Answer: A

NEW QUESTION 2
Adam works as a professional Computer Hacking Forensic Investigator. He has been assigned with a project to investigate a computer in the network of SecureEnet Inc. The compromised system runs on Windows operating system. Adam decides to use Helix Live for Windows to gather data and electronic evidences starting with retrieving volatile data and transferring it to server component via TCP/IP. Which of the following application software in Helix Windows Live will he use to retrieve volatile data and transfer it to the server component via TCP/IP?

  • A. FAU
  • B. FTK imager
  • C. Drive Manager
  • D. FSP

Answer: D

NEW QUESTION 3
Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc. Which of the following types of Cross-Site Scripting attack Ryan intends to do?

  • A. Non persistent
  • B. SAX
  • C. Persistent
  • D. Document Object Model (DOM)

Answer: C

NEW QUESTION 4
Which of the following techniques is used to identify attacks originating from a botnet?

  • A. IFilter
  • B. BPF-based filter
  • C. Passive OS fingerprinting
  • D. Recipient filtering

Answer: C

NEW QUESTION 5
Which of the following are well-known ports?
Each correct answer represents a complete solution. Choose two.

  • A. 443
  • B. 21
  • C. 1024
  • D. 8080

Answer: AB

NEW QUESTION 6
Which of the following is the unspecified address in IPv6?

  • A. 1:1:1:1:1:1:1:1
  • B. 0:0:0:0:0:0:0:0
  • C. 0:0:0:0:0:0:0:1
  • D. 1:0:0:0:0:0:0:0

Answer: B

NEW QUESTION 7
Windump is a Windows port of the famous TCPDump packet sniffer available on a variety of platforms. In order to use this tool on the Windows platform a user must install a packet capture library.
What is the name of this library?

  • A. libpcap
  • B. WinPCap
  • C. PCAP
  • D. SysPCap

Answer: B

NEW QUESTION 8
Which of the following is designed to protect the Internet resolvers (clients) from forged DNS data that are created by the DNS cache poisoning?

  • A. Split-horizon DNS
  • B. Stub resolver
  • C. Domain Name System Extension (DNSSEC)
  • D. BINDER

Answer: C

NEW QUESTION 9
Which of the following statements are true about snort?
Each correct answer represents a complete solution. Choose all that apply.

  • A. It develops a new signature to find vulnerabilitie
  • B. It detects and alerts a computer user when it finds threats such as buffer overflows, stealth port scans, CGI attacks, SMB probes and NetBIOS queries, NMAP and other port scanners, well-known backdoors and system vulnerabilities, and DDoS client
  • C. It encrypts the log file using the 256 bit AES encryption scheme algorith
  • D. It is used as a passive trap to record the presence of traffic that should not be found on a network, such as NFS or Napster connection

Answer: ABD

NEW QUESTION 10
John works as a Network Security Administrator for NetPerfect Inc. The manager of the company has told John that the company's phone bill has increased drastically. John suspects that the company's phone system has been cracked by a malicious hacker. Which attack is used by malicious hackers to crack the phone system?

  • A. War dialing
  • B. Sequence++ attack
  • C. Phreaking
  • D. Man-in-the-middle attack

Answer: C

NEW QUESTION 11
Which of the following command line tools are available in Helix Live acquisition tool on Windows?
Each correct answer represents a complete solution. Choose all that apply.

  • A. netstat
  • B. ipconfig
  • C. .cab extractors
  • D. whois

Answer: ABC

NEW QUESTION 12
Andrew works as a System Administrator for NetPerfect Inc. All client computers on the network run on Mac OS X. The Sales Manager of the company complains that his MacBook is not able to boot. Andrew wants to check the booting process. He suspects that an error persists in the bootloader of Mac OS X. Which of the following is the default bootloader on Mac OS X that he should use to resolve the issue?

  • A. LILO
  • B. BootX
  • C. NT Loader
  • D. GRUB

Answer: B

NEW QUESTION 13
Which of the following protocols is used to translate IP addresses to Ethernet addresses?

  • A. Border Gateway Protocol (BGP)
  • B. Routing Information Protocol (RIP)
  • C. Address Resolution Protocol (ARP)
  • D. Internet Control Message Protocol (ICMP)

Answer: C

NEW QUESTION 14
Which of the following proxy servers is also referred to as transparent proxies or forced proxies?

  • A. Tunneling proxy server
  • B. Reverse proxy server
  • C. Anonymous proxy server
  • D. Intercepting proxy server

Answer: D

NEW QUESTION 15
Which of the following NETSH commands for interface Internet protocol version 4 (IPv4) is used to add a DNS server to a list of DNS servers for a specified interface?

  • A. net dnsserver
  • B. add address
  • C. add dnsserver
  • D. add neighbors

Answer: C

NEW QUESTION 16
Which of the following are the two different file formats in which Microsoft Outlook saves e-mail messages based on system configuration?
Each correct answer represents a complete solution. Choose two.

  • A. .txt
  • B. .pst
  • C. .xst
  • D. .ost

Answer: BD

NEW QUESTION 17
Which of the following conclusions can be drawn from viewing the given output generated by the PING command-line utility?
GCIA dumps exhibit

  • A. The network bandwidth is heavily utilize
  • B. The IP address of the destination computer is not resolve
  • C. There is no connectivity between the source and the destination compute
  • D. The hub is not workin

Answer: C

NEW QUESTION 18
What is the order of the extension headers that is followed by IPv6?

  • A. Destination Options (first), Routing, IPv6 header, Hop-by-Hop, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payloa
  • B. Routing, Hop-by-Hop, Destination Options (first), Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payloa
  • C. Fragment, Routing, Hop-by-Hop, Destination Options (first), Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payloa
  • D. IPv6 header, Hop-by-Hop, Destination Options (first), Routing, Fragment, Authentication, Encrypted Security Payload, Destination Options (second), followed by an Upper-layer header, indicating payloa

Answer: D

NEW QUESTION 19
......

Recommend!! Get the Full GCIA dumps in VCE and PDF From Dumps-files.com, Welcome to Download: https://www.dumps-files.com/files/GCIA/ (New 508 Q&As Version)