aiotestking uk

GCIA Exam Questions - Online Test


GCIA Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

Want to know Pass4sure GCIA Exam practice test features? Want to lear more about GIAC GIAC Certified Intrusion Analyst certification experience? Study Pinpoint GIAC GCIA answers to Up to the immediate present GCIA questions at Pass4sure. Gat a success with an absolute guarantee to pass GIAC GCIA (GIAC Certified Intrusion Analyst) test on your first attempt.

Online GIAC GCIA free dumps demo Below:

NEW QUESTION 1
Which of the following DNS resource records is used to resolve a host name to an IPv6 address?

  • A. AAAA
  • B. HINFO
  • C. CNAME
  • D. A

Answer: A

NEW QUESTION 2
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it against an established baseline?

  • A. Signature-based
  • B. Network-based
  • C. File-based
  • D. Anomaly-based

Answer: D

NEW QUESTION 3
Which of the following tools is described below?
It is a set of tools that are used for sniffing passwords, e-mail, and HTTP traffic. Some of its tools include arpredirect, macof, tcpkill, tcpnice, filesnarf, and mailsnarf. It is highly effective for sniffing both switched and shared networks. It uses the arpredirect and macof tools for switching across switched networks. It can also be used to capture authentication information for FTP, telnet, SMTP, HTTP, POP, NNTP, IMAP, etc.

  • A. Dsniff
  • B. Libnids
  • C. Cain
  • D. LIDS

Answer: A

NEW QUESTION 4
Which of the following wireless network standards operates on the 5 GHz band and transfers data at a rate of 54 Mbps?

  • A. 802.11g
  • B. 802.11a
  • C. 802.11u
  • D. 802.11b

Answer: B

NEW QUESTION 5
Which of the following user authentications are supported by the SSH-1 protocol but not by the SSH-2 protocol?
Each correct answer represents a complete solution. Choose all that apply.

  • A. TIS authentication
  • B. Rhosts (rsh-style) authentication
  • C. Kerberos authentication
  • D. Password-based authentication

Answer: ABC

NEW QUESTION 6
Andrew works as an Administrator for a Windows 2000 based network. The network has a primary external DNS server, and a secondary DNS server located on the ISP's UNIX server, in order to provide fault tolerance. Users complain that they are unable to connect to the URL when using the secondary server. What should Andrew do to resolve the problem?

  • A. He should disable the fast zone transfer in the Advanced tab of the Properties window on the secondary serve
  • B. He should select the BIND secondaries check box in the Zone Transfer tab of the Properties window on the primary serve
  • C. He should select the BIND secondaries check box in the Advanced tab of the Properties window on the primary serve
  • D. He should enable the fast zone transfer in the Advanced tab of the Properties window on the primary serve

Answer: C

NEW QUESTION 7
Which of the following partitions contains the system files that are used to start the operating system?

  • A. Boot partition
  • B. System partition
  • C. Secondary partition
  • D. Primary partition

Answer: A

NEW QUESTION 8
Every network device contains a unique built in Media Access Control (MAC) address, which is used to identify the authentic device to limit the network access. Which of the following addresses is a valid MAC address?

  • A. A3-07-B9-E3-BC-F9
  • B. 132.298.1.23
  • C. F936.28A1.5BCD.DEFA
  • D. 1011-0011-1010-1110-1100-0001

Answer: A

NEW QUESTION 9
Which of the following wireless security features provides the best wireless security mechanism?

  • A. WPA
  • B. WPA with Pre Shared Key
  • C. WPA with 802.1X authentication
  • D. WEP

Answer: C

NEW QUESTION 10
Which of the following can be configured so that when an alarm is activated, all doors lock and the suspect or intruder is caught between the doors in the dead-space?

  • A. Man trap
  • B. Network Intrusion Detection System (NIDS)
  • C. Biometric device
  • D. Host Intrusion Detection System (HIDS)

Answer: A

NEW QUESTION 11
Which of the following techniques is used to log network traffic?

  • A. Cracking
  • B. IP address spoofing
  • C. Tunneling
  • D. Sniffing

Answer: D

NEW QUESTION 12
John works as a professional Ethical Hacker for SecureEnet Inc. The company has a Windowsbased network. All client computers run on Windows XP. A project has been assigned to John to investigate about the open ports responsible for various malicious attacks on the network. John wants to use the DOS command-line utility to find out the open ports. Which of the following DOS commands will John use to accomplish the task?

  • A. tracert and pathping
  • B. nslookup
  • C. nbtstat
  • D. netstat

Answer: D

NEW QUESTION 13
Which of the following ICMP types refers to the message "Time Exceeded"?

  • A. Type 4
  • B. Type 12
  • C. Type 11
  • D. Type 5

Answer: C

NEW QUESTION 14
Adam works as a Network Administrator for CertLeader Inc. He wants to prevent the network from
DOS attacks. Which of the following is most useful against DOS attacks?

  • A. Internet bot
  • B. Honey Pot
  • C. SPI
  • D. Distributive firewall

Answer: C

NEW QUESTION 15
You are planning DNS configuration for your company. You decide to configure an Active Directory integrated DNS.
Which of the following are the benefits of Active Directory integrated DNS configuration?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Replication is more efficien
  • B. Multi-master environments are more fault toleran
  • C. Single-master environment is simpler to administe
  • D. It results in enhanced securit

Answer: ABD

NEW QUESTION 16
Peter works as a System Administrator for TechSoft Inc. The company uses Linux-based systems.
Peter's manager suspects that someone is trying to log in to his computer in his absence. Which of the following commands will Peter run to show the last unsuccessful login attempts, as well as the users who have last logged in to the manager's system?
Each correct answer represents a complete solution. Choose two.

  • A. lastb
  • B. pwd
  • C. last
  • D. rwho -a

Answer: AC

NEW QUESTION 17
Which of the following DoS attacks is a multi-tier attack?

  • A. Snork Attack
  • B. SYN flood
  • C. DDoS attack
  • D. Smurf attack

Answer: C

NEW QUESTION 18
......

Thanks for reading the newest GCIA exam dumps! We recommend you to try the PREMIUM Dumps-files.com GCIA dumps in VCE and PDF here: https://www.dumps-files.com/files/GCIA/ (508 Q&As Dumps)