aiotestking uk

GCIA Exam Questions - Online Test


GCIA Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Master the GCIA GIAC Certified Intrusion Analyst content and be ready for exam day success quickly with this Testking GCIA practice exam. We guarantee it!We make it a reality and give you real GCIA questions in our GIAC GCIA braindumps.Latest 100% VALID GIAC GCIA Exam Questions Dumps at below page. You can use our GIAC GCIA braindumps and pass your exam.

Online GIAC GCIA free dumps demo Below:

NEW QUESTION 1
Which of the following firewalls inspects the actual contents of packets?

  • A. Application-level firewall
  • B. Stateful inspection firewall
  • C. Packet filtering firewall
  • D. Circuit-level firewall

Answer: A

NEW QUESTION 2
Adam works as a Security Analyst for Umbrella Inc. He is performing real-time traffic analysis on IP networks using Snort. Adam is facing problems in analyzing intrusion data. Which of the following software combined with Snort can Adam use to get a visual representation of intrusion data?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Basic Analysis and Security Engine (BASE)
  • B. sguil
  • C. KFSensor
  • D. OSSIM

Answer: ABD

NEW QUESTION 3
Adam works as a professional Computer Hacking Forensic Investigator, a project has been assigned to him to investigate and examine files present on suspect's computer. Adam uses a tool with the help of which he can examine recovered deleted files, fragmented files, and other corrupted data. He can also examine the data, which was captured from the network, and access the physical RAM, and any processes running in virtual memory with the help of this tool. Which of the following tools is Adam using?

  • A. Vedit
  • B. WinHex
  • C. HxD
  • D. Evidor

Answer: B

NEW QUESTION 4
You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?

  • A. IPCONFIG
  • B. PING
  • C. TRACERT
  • D. NSLOOKUP

Answer: D

NEW QUESTION 5
You work as a Network Security Administrator for NetPerfect Inc. The company has a Windowsbased network. You are incharge of the data and network security of the company. While performing a threat log analysis, you observe that one of the database administrators is pilfering confidential data. What type of threat is this?

  • A. Zombie
  • B. External threat
  • C. Internal threat
  • D. Malware

Answer: C

NEW QUESTION 6
This is a Windows-based tool that is used for the detection of wireless LANs using the IEEE 802.11a, 802.11b, and 802.11g standards. The main features of these tools are as follows:
-It displays the signal strength of a wireless network, MAC address, SSID, channel details, etc. -It is commonly used for the following purposes:

  • A. War driving
  • B. Detecting unauthorized access points
  • C. Detecting causes of interference on a WLAN
  • D. WEP ICV error tracking
  • E. Making Graphs and Alarms on 802.11 Data, including Signal Strength

Answer: D

NEW QUESTION 7
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate a multimedia enabled mobile phone, which is suspected to be used in a cyber crime. Adam uses a tool, with the help of which he can recover deleted text messages, photos, and call logs of the mobile phone. Which of the following tools is Adam using?

  • A. FAU
  • B. FTK Imager
  • C. Galleta
  • D. Device Seizure

Answer: D

NEW QUESTION 8
Which of the following is used to provide a protective shield for the data passing over the Internet?

  • A. Firewall
  • B. Proxy server
  • C. Intrusion detection system
  • D. Tunneling

Answer: D

NEW QUESTION 9
You are using a Windows-based sniffer named ASniffer to record the data traffic of a network. You have extracted the following IP Header information of a randomly chosen packet from the sniffer's log:
45 00 00 28 00 00 40 00 29 06 43 CB D2 D3 82 5A 3B 5E AA 72
Which of the following TTL decimal values and protocols are being carried by the IP Header of this packet?

  • A. 41, UDP
  • B. 16, ICMP
  • C. 41, TCP
  • D. 16, UDP

Answer: C

NEW QUESTION 10
Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?
Each correct answer represents a complete solution. Choose three.

  • A. These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized acces
  • B. These are the threats that originate from within the organizatio
  • C. These are the threats intended to flood a network with large volumes of access request
  • D. These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Interne

Answer: ACD

NEW QUESTION 11
You work as a Network Administrator for McRobert Inc. Your company has a TCP/IP-based network. You want to get the protocol statistics and the active TCP/IP network connections of your computer. Which of the following will you use?

  • A. IPSTAT
  • B. SNMP
  • C. ARP
  • D. NBTSTAT
  • E. NETSTAT

Answer: E

NEW QUESTION 12
Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses 'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Buffer-overflow attack
  • B. Brute force attack
  • C. Dictionary-based attack
  • D. Password guessing
  • E. Social engineering
  • F. Zero-day attack
  • G. Denial-of-service (DoS) attack
  • H. Rainbow attack

Answer: BCDEH

NEW QUESTION 13
Which of the following commands prints out the headers of packets regarding the boolean expression?

  • A. tcpdump
  • B. vmstat
  • C. iftop
  • D. iostat

Answer: A

NEW QUESTION 14
Which of the following malicious programs changes its signature continuously to be invisible to IDS?

  • A. Boot sector virus
  • B. Trojan
  • C. Malware
  • D. Polymorphic virus

Answer: D

NEW QUESTION 15
Which of the following is a signature-based intrusion detection system (IDS) ?

  • A. Snort
  • B. StealthWatch
  • C. RealSecure
  • D. Tripwire

Answer: A

NEW QUESTION 16
Which of the following is true for XSS, SQL injection, and RFI?

  • A. These are Trojan
  • B. These are hacking tool
  • C. These are types of Web application vulnerabilitie
  • D. These are viruse

Answer: C

NEW QUESTION 17
Which of the following components are usually found in an Intrusion detection system (IDS)?
Each correct answer represents a complete solution. Choose two.

  • A. Sensor
  • B. Gateway
  • C. Firewall
  • D. Modem
  • E. Console

Answer: AE

NEW QUESTION 18
......

Thanks for reading the newest GCIA exam dumps! We recommend you to try the PREMIUM Thedumpscentre.com GCIA dumps in VCE and PDF here: https://www.thedumpscentre.com/GCIA-dumps/ (508 Q&As Dumps)