High value of GCIA free practice questions materials and exam guide for GIAC certification for candidates, Real Success Guaranteed with Updated GCIA pdf dumps vce Materials. 100% PASS GIAC Certified Intrusion Analyst exam Today!
GIAC GCIA Free Dumps Questions Online, Read and Test Now.
NEW QUESTION 1
John works as a Professional Ethical Hacker for NetPerfect Inc. The company has a Linux-based network. All client computers are running on Red Hat 7.0 Linux. The Sales Manager of the company complains to John that his system contains an unknown package named as tar.gz and his documents are exploited. To resolve the problem, John uses a Port scanner to enquire about the open ports and finds out that the HTTP server service port on 27374 is open. He suspects that the other computers on the network are also facing the same problem. John discovers that a malicious application is using the synscan tool to randomly generate IP addresses. Which of the following worms has attacked the computer?
Answer: A
NEW QUESTION 2
Which of the following attacks is based on the concept that IDSs cannot recognize Unicode encoded malicious data?
Answer: C
NEW QUESTION 3
Which of the following partitions contains the system files that are used to start the operating system?
Answer: B
NEW QUESTION 4
Which of the following tools can be used to view active telnet sessions?
Answer: A
NEW QUESTION 5
You work as a Network Administrator for McRobert Inc. You want to know the NetBIOS name of your computer. Which of the following commands will you use?
Answer: C
NEW QUESTION 6
Adam works as a Security Administrator for Umbrella Inc. A project has been assigned to him to secure access to the network of the company from all possible entry points. He segmented the network into several subnets and installed firewalls all over the network. He has placed very stringent rules on all the firewalls, blocking everything in and out except ports that must be used.
He does need to have port 80 open since his company hosts a website that must be accessed from the Internet. Adam is still worried about programs like Hping2 that can get into a network through covert channels.
Which of the following is the most effective way to protect the network of the company from an attacker using Hping2 to scan his internal network?
Answer: A
NEW QUESTION 7
Which of the following ports is the default port for IMAP4 protocol?
Answer: A
NEW QUESTION 8
John works as a Network Security Administrator for NetPerfect Inc. The manager of the company has told John that the company's phone bill has increased drastically. John suspects that the company's phone system has been cracked by a malicious hacker. Which attack is used by malicious hackers to crack the phone system?
Answer: C
NEW QUESTION 9
The following output is generated by running the show ip route command:
RouterA#show ip route
< - - Output Omitted for brevity - ->
Which next hop address will RouterA use in forwarding traffic to 10.10.100.0/24?
Answer: C
NEW QUESTION 10
Mark works as the Network Administrator of a Windows 2000 based network. The network has a DNS server installed. He experiences host name resolution problems on the network. In order to rectify the situation, he wants to troubleshoot DNS name resolution problems on the network.
Which of the following tools will he use to do this?
Answer: A
NEW QUESTION 11
Which of the following are well-known ports?
Each correct answer represents a complete solution. Choose two.
Answer: AB
NEW QUESTION 12
Which of the following files in LILO booting process of Linux operating system stores the location of Kernel on the hard drive?
Answer: B
NEW QUESTION 13
Which of the following DNS records is used for host name to IPv6 address resolution?
Answer: D
NEW QUESTION 14
John works as a Security Administrator for NetPerfect Inc. The company uses Windows-based systems. A project has been assigned to John to track malicious hackers and to strengthen the company's security system. John configures a computer system to trick malicious hackers into thinking that it is the company's main server, which in fact is a decoy system to track hackers.
Which system is John using to track the malicious hackers?
Answer: A
NEW QUESTION 15
Which of the following is included in a memory dump file?
Answer: ACD
NEW QUESTION 16
In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entire zone file for a domain from a DNS server. The information provided by the DNS zone can help an attacker gather user names, passwords, and other valuable information. To attempt a zone transfer, an attacker must be connected to a DNS server that is the authoritative server for that zone. Besides this, an attacker can launch a Denial of Service attack against the zone's DNS servers by flooding them with a lot of requests. Which of the following tools can an attacker use to perform a DNS zone transfer?
Each correct answer represents a complete solution. Choose all that apply.
Answer: ABC
NEW QUESTION 17
You work as a Network Administrator for McRobert Inc. Your company has a Windows NT 4.0 TCP/IP-based network. You want to list the cache of NetBIOS names and IP addresses. Which of the following utilities will you use?
Answer: B
NEW QUESTION 18
......
P.S. Allfreedumps.com now are offering 100% pass ensure GCIA dumps! All GCIA exam questions have been updated with correct answers: https://www.allfreedumps.com/GCIA-dumps.html (508 New Questions)