GCIA | How Many Questions Of GCIA Test Preparation
It is more faster and easier to pass the GIAC GCIA exam by using Guaranteed GIAC GIAC Certified Intrusion Analyst questuins and answers. Immediate access to the Avant-garde GCIA Exam and find the same core area GCIA questions with professionally verified answers, then PASS your exam with a high score now.
GIAC GCIA Free Dumps Questions Online, Read and Test Now.
NEW QUESTION 1
For a host to have successful Internet communication, which of the following network protocols are required? You should assume that the users will not manually configure the computer in anyway and that the measure of success will be whether the user can access Web sites after powering the computer and logging on.
Each correct answer represents a complete solution. Choose all that apply.
- A. DNS
- B. HTTP/HTTPS
- C. DHCP
- D. NTP
Answer: ABC
NEW QUESTION 2
Which of the following is a form of cheating or copying someone else's work or idea without acknowledging the source?
- A. Patent
- B. Turnitin
- C. Copyright
- D. Plagiarism
Answer: D
NEW QUESTION 3
Which of the following NETSH commands for interface Internet protocol version 4 (IPv4) is used to delete a DNS server or all DNS servers from a list of DNS servers for a specified interface or for all interfaces?
- A. alter dnsserver
- B. delete dnsserver
- C. disable dnsserver
- D. remove dnsserver
Answer: B
NEW QUESTION 4
Adam works as a professional Computer Hacking Forensic Investigator, a project has been assigned to him to investigate and examine files present on suspect's computer. Adam uses a tool with the help of which he can examine recovered deleted files, fragmented files, and other corrupted data. He can also examine the data, which was captured from the network, and access the physical RAM, and any processes running in virtual memory with the help of this tool. Which of the following tools is Adam using?
- A. Vedit
- B. WinHex
- C. HxD
- D. Evidor
Answer: B
NEW QUESTION 5
What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?
- A. Stoner
- B. Code Red
- C. Brain
- D. Sircam
Answer: C
NEW QUESTION 6
Which of the following ICMP types refers to the message "Time Exceeded"?
- A. Type 4
- B. Type 12
- C. Type 11
- D. Type 5
Answer: C
NEW QUESTION 7
Adam works as a Computer Hacking Forensic Investigator in a law firm. He has been assigned with his first project. Adam collected all required evidences and clues. He is now required to write an investigative report to present before court for further prosecution of the case. He needs guidelines to write an investigative report for expressing an opinion. Which of the following are the guidelines to write an investigative report in an efficient way?
Each correct answer represents a complete solution. Choose all that apply.
- A. All ideas present in the investigative report should flow logically from facts to conclusion
- B. Opinion of a lay witness should be included in the investigative repor
- C. The investigative report should be understandable by any reade
- D. There should not be any assumptions made about any facts while writing the investigative repor
Answer: ACD
NEW QUESTION 8
Which of the following tools is used to locate lost files and partitions to restore data from a formatted, damaged, or lost partition in Windows and Apple Macintosh computers?
- A. Easy-Undelete
- B. VirtualLab
- C. File Scavenger
- D. Recover4all Professional
Answer: B
NEW QUESTION 9
Which of the following utilities can generate a local static route table?
Each correct answer represents a complete solution. Choose two.
- A. ROUTE
- B. PING
- C. NETSTAT
- D. TRACERT
- E. NBTSTAT
Answer: AC
NEW QUESTION 10
Which of the following is NOT an Intrusion Detection System?
- A. Fragroute
- B. Stunnel
- C. Samhain
- D. AIDE
Answer: B
NEW QUESTION 11
You work as a technician for Tech Perfect Inc. You are troubleshooting an Internet name resolution issue. You ping your ISP's DNS server address and find that the server is down. You want to continuously ping the DNS address until you have stopped the command. Which of the following commands will you use?
- A. ping -a
- B. ping -l
- C. ping -t
- D. ping –n
Answer: C
NEW QUESTION 12
Which of the following UDP ports are used by the Simple Network Management Protocol (SNMP)? Each correct answer represents a complete solution. Choose two.
- A. UDP port 69
- B. UDP port 161
- C. UDP port 137
- D. UDP port 162
Answer: BD
NEW QUESTION 13
Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following switches will she use with CHKDSK command to accomplish the task?
- A. CHKDSK /I
- B. CHKDSK /R /F
- C. CHKDSK /C /L
- D. CHKDSK /V /X
Answer: B
NEW QUESTION 14
Which of the following DoS attacks points the Central Processing Unit (CPU) to a non-existent memory location causing the running process to end abruptly?
- A. Buffer Overflow attack
- B. Teardrop attack
- C. Fraggle attack
- D. Snork attack
Answer: A
NEW QUESTION 15
You work as a system administrator for BlueSkwer.com. You are using IPv6 on all computers. You want to ensure that you do not need to manually configure the IPv6 addresses. You want to take advantage of the router discovery features. For router discovery to work properly, what is needed?
- A. A properly configured IPv6 router
- B. Network load balancers
- C. CAT 6 cables
- D. Internet Explorer 8
Answer: A
NEW QUESTION 16
Which of the following IP packet elements is responsible for authentication while using IPSec?
- A. Internet Key Exchange (IKE)
- B. Authentication Header (AH)
- C. Layer 2 Tunneling Protocol (L2TP)
- D. Encapsulating Security Payload (ESP)
Answer: B
NEW QUESTION 17
Adam works as a professional Computer Hacking Forensic Investigator. He has been called by the FBI to examine data of the hard disk, which is seized from the house of a suspected terrorist.
Adam decided to acquire an image of the suspected hard drive. He uses a forensic hardware tool, which is capable of capturing data from IDE, Serial ATA, SCSI devices, and flash cards. This tool can also produce MD5 and CRC32 hash while capturing the data. Which of the following tools is Adam using?
- A. ImageMASSter Solo-3
- B. ImageMASSter 4002i
- C. FireWire DriveDock
- D. Wipe MASSter
Answer: A
NEW QUESTION 18
You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You have configured a WAN link for the network. You are facing connectivity problem across the WAN link. What will be your first step in troubleshooting the issue?
- A. Reinstall TCP/IP protoco
- B. Check that the correct default gateway is se
- C. Enable DN
- D. Ensure that NetBEUI protocol is loade
- E. Use the NETSTAT utility to view TCP/IP statistic
Answer: B
NEW QUESTION 19
......
Recommend!! Get the Full GCIA dumps in VCE and PDF From Dumpscollection.com, Welcome to Download: https://www.dumpscollection.net/dumps/GCIA/ (New 508 Q&As Version)