GCIA | Simulation GIAC GCIA Testing Bible Online
It is more faster and easier to pass the GIAC GCIA exam by using Real GIAC GIAC Certified Intrusion Analyst questuins and answers. Immediate access to the Up to date GCIA Exam and find the same core area GCIA questions with professionally verified answers, then PASS your exam with a high score now.
Online GIAC GCIA free dumps demo Below:
NEW QUESTION 1
In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?
- A. Fragmentation overlap attack
- B. Evasion attack
- C. Fragmentation overwrite attack
- D. Insertion attack
Answer: D
NEW QUESTION 2
Which of the following protocols is used by voice over IP (VoIP) applications?
- A. UDP
- B. TCP
- C. ICMP
- D. IPv6
Answer: A
NEW QUESTION 3
Which of the following is an example of a firewall?
- A. ZoneAlarm
- B. PatriotBox
- C. Specter
- D. KFSensor
Answer: A
NEW QUESTION 4
Which of the following ports is the default port for IMAP4 protocol?
- A. TCP port 143
- B. TCP port 25
- C. TCP port 443
- D. TCP port 80
Answer: A
NEW QUESTION 5
Which of the following log files are used to collect evidences before taking the bit-stream image of the BlackBerry?
Each correct answer represents a complete solution. Choose all that apply.
- A. user history
- B. Transmit/Receive
- C. Radio status
- D. Roam and Radio
Answer: BCD
NEW QUESTION 6
What are the advantages of an application layer firewall?
Each correct answer represents a complete solution. Choose all that apply.
- A. It provides detailed logging information for management purpose
- B. It prevents most of the spoofing and DoS attack
- C. It monitors and filters dat
- D. It provides authentication to a devic
Answer: ABC
NEW QUESTION 7
You work as a Network Security Administrator for NetPerfect Inc. The company has a Windowsbased network. You are incharge of the data and network security of the company. While performing a threat log analysis, you observe that one of the database administrators is pilfering confidential data. What type of threat is this?
- A. Zombie
- B. External threat
- C. Internal threat
- D. Malware
Answer: C
NEW QUESTION 8
You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You want to get the protocol statistics and the active TCP/IP network connections of your computer. Which of the following will you use?
- A. IPSTAT
- B. SNMP
- C. ARP
- D. NBTSTAT
- E. NETSTAT
Answer: E
NEW QUESTION 9
Ben works as a Network Administrator in Business Software Solutions Ltd. The company uses a Windowsbased operating system throughout its network. Ben finds the following mail exchange record on the server:
max1.CertLeader.com. IN A 613.0.2.1
IN AAAA 4ffe:d00:1:1::88
Which of the following conclusions can Ben derive from this record?
- A. It indicates the configuration of the POP3 server (max1) on the site CertLeader.com on how to handle e-mails from the site 613.0.2.1 and an internal computer with NIC address 4ffe:d00:1:1::88.
- B. It indicates the preference of the recor
- C. It indicates the configuration of the SMTP server (max1) on the site CertLeader.com on how to handle e-mails from the site 613.0.2.1 and an internal computer with NIC address 4ffe:d00:1:1::88.
- D. It indicates part of the DNS configuration for the primary server to handle both IPV4 and IPV6 request
Answer: D
NEW QUESTION 10
Which of the following is the default port for Simple Network Management Protocol (SNMP)?
- A. TCP port 110
- B. TCP port 25
- C. TCP port 80
- D. UDP port 161
Answer: D
NEW QUESTION 11
Which of the following are the two sub-layers present in Data Link layer of the OSI Reference model?
- A. Logical control and Link control
- B. Data control and Media Access control
- C. Machine Link control and Logical Link control
- D. Logical Link control and Media Access control
Answer: D
NEW QUESTION 12
Which of the following ports can be used for IP spoofing?
- A. NNTP 119
- B. POP 110
- C. Rlogin 513
- D. Whois 43
Answer: C
NEW QUESTION 13
Which of the following proxy servers is placed anonymously between the client and remote server and handles all of the traffic from the client?
- A. Caching proxy server
- B. Web proxy server
- C. Forced proxy server
- D. Open proxy server
Answer: C
NEW QUESTION 14
Which of the following is the default port for File Transport Protocol (FTP)?
- A. 21
- B. 25
- C. 23
- D. 80
Answer: A
NEW QUESTION 15
John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks?
Each correct answer represents a complete solution. Choose all that apply.
- A. Brute Force attack
- B. Dictionary attack
- C. Rule based attack
- D. Hybrid attack
Answer: ABD
NEW QUESTION 16
Peter works as a Computer Hacking Forensic Investigator. He has been called by an organization to conduct a seminar to give necessary information related to sexual harassment within the work place. Peter started with the definition and types of sexual harassment. He then wants to convey that it is important that records of the sexual harassment incidents should be maintained, which helps in further legal prosecution. Which of the following data should be recorded in this documentation?
Each correct answer represents a complete solution. Choose all that apply.
- A. Names of the victims
- B. Date and time of incident
- C. Nature of harassment
- D. Location of each incident
Answer: ABD
NEW QUESTION 17
You are a professional Computer Hacking forensic investigator. You have been called to collect the evidences of Buffer Overflows or Cookie snooping attack. Which of the following logs will you review to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
- A. Event logs
- B. Program logs
- C. Web server logs
- D. System logs
Answer: ABD
NEW QUESTION 18
Which of the following is a checksum algorithm?
- A. Dsniff
- B. Adler-32
- C. Hash buster
- D. Snort
Answer: B
NEW QUESTION 19
......
P.S. DumpSolutions.com now are offering 100% pass ensure GCIA dumps! All GCIA exam questions have been updated with correct answers: https://www.dumpsolutions.com/GCIA-dumps/ (508 New Questions)