GCIA Premium Bundle

GCIA Premium Bundle

GIAC Certified Intrusion Analyst Certification Exam

4.5 
(56340 ratings)
508 QuestionsPractice Tests
508 PDFPrint version
November 23, 2024Last update

GIAC GCIA Free Practice Questions

Exam Code: GCIA (Practice Exam Latest Test Questions VCE PDF)
Exam Name: GIAC Certified Intrusion Analyst
Certification Provider: GIAC
Free Today! Guaranteed Training- Pass GCIA Exam.

Also have GCIA free dumps questions for you:

NEW QUESTION 1
You work as a Network Administrator for Tech Perfect Inc. The office network is configured as an IPv6 network. You have to configure a computer with the IPv6 address, which is equivalent to an IPv4 publicly routable address. Which of the following types of addresses will you choose?

  • A. Site-local
  • B. Global unicast
  • C. Local-link
  • D. Loopback

Answer: B

NEW QUESTION 2
Which of the following honeypots is a low-interaction honeypot and is used by companies or corporations for capturing limited information about malicious hackers?

  • A. Production honeypot
  • B. Research honeypot
  • C. Honeynet
  • D. Honeyfarm

Answer: A

NEW QUESTION 3
You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. Active Directory integrated zone has been configured on the network. You want to create a text file that lists the resource records of a specified zone for your record. Which of the following commands will you use to accomplish the task?

  • A. DNSCMD /createdirectorypartition
  • B. DNSCMD /copydns
  • C. DNSCMD /zoneexport
  • D. DNSCMD /config

Answer: C

NEW QUESTION 4
Which of the following utilities provides information as per the format given below?
GCIA dumps exhibit

  • A. TRACERT
  • B. NBTSTAT
  • C. NETSTAT
  • D. PING

Answer: A

NEW QUESTION 5
John enters a URL http://www.cisco.com/web/learning in the web browser. A web page appears after he enters the URL. Which of the following protocols is used to resolve www.cisco.com into the correct IP address?

  • A. DNS
  • B. SMTP
  • C. DHCP
  • D. ARP

Answer: A

NEW QUESTION 6
Peter works as a Technical Representative in a CSIRT for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?

  • A. Volatile data, file slack, registry, memory dumps, file system, system state backup, interne t traces
  • B. Volatile data, file slack, file system, registry, memory dumps, system state backup, interne t traces
  • C. Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system
  • D. Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps

Answer: B

NEW QUESTION 7
Adam works on a Linux system. He is using Sendmail as the primary application to transmit e-mails.
Linux uses Syslog to maintain logs of what has occurred on the system. Which of the following log files contains e-mail information such as source and destination IP addresses, date and time stamps etc?

  • A. /log/var/mailog
  • B. /var/log/logmail
  • C. /var/log/mailog
  • D. /log/var/logd

Answer: C

NEW QUESTION 8
Which of the following techniques allows probing firewall rule-sets and finding entry points into the targeted system or network?

  • A. Network enumerating
  • B. Packet collision
  • C. Distributed Checksum Clearinghouse
  • D. Packet crafting

Answer: D

NEW QUESTION 9
Andrew works as a Forensic Investigator for CertLeader Inc. The company has a Windows-based environment. The company's employees use Microsoft Outlook Express as their e-mail client program. E-mails of some employees have been deleted due to a virus attack on the network.
Andrew is therefore assigned the task to recover the deleted mails. Which of the following tools can Andrew use to accomplish the task?
Each correct answer represents a complete solution. Choose two.

  • A. EventCombMT
  • B. R-mail
  • C. eMailTrackerPro
  • D. FINALeMAIL

Answer: BD

NEW QUESTION 10
Which of the following is known as a message digest?

  • A. Hash function
  • B. Hashing algorithm
  • C. Spider
  • D. Message authentication code

Answer: A

NEW QUESTION 11
Which of the following tools performs comprehensive tests against web servers for multiple items, including over 6100 potentially dangerous files/CGIs?

  • A. Dsniff
  • B. Snort
  • C. Nikto
  • D. Sniffer

Answer: C

NEW QUESTION 12
Which of the following is designed to protect the Internet resolvers (clients) from forged DNS data that are created by the DNS cache poisoning?

  • A. Split-horizon DNS
  • B. Stub resolver
  • C. Domain Name System Extension (DNSSEC)
  • D. BINDER

Answer: C

NEW QUESTION 13
You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate Plagiarism occurred in the source code files of C#. Which of the following tools will you use to detect the software plagiarism?

  • A. VAST
  • B. Jplag
  • C. SCAM
  • D. Turnitin

Answer: B

NEW QUESTION 14
Which of the following command-line utilities is used to show the state of current TCP/IP connections?

  • A. PING
  • B. TRACERT
  • C. NETSTAT
  • D. NSLOOKUP

Answer: C

NEW QUESTION 15
You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based network. You are configuring an Internet connection on a server. Which of the following servers filters outbound Web traffic on the network?

  • A. DHCP server
  • B. DNS server
  • C. Proxy server
  • D. WINS server

Answer: C

NEW QUESTION 16
At which port does a DHCPv6 client listen for DHCP messages?

  • A. TCP port 546
  • B. TCP port 547
  • C. UDP port 546
  • D. UDP port 547

Answer: C

NEW QUESTION 17
Which of the following best describes the term protocol?

  • A. The ability to move data through layers of the OSI mode
  • B. The combination of cable type and access method used on a networ
  • C. A set of rule
  • D. The permissible amount of data contained in a packe

Answer: C

NEW QUESTION 18
Which of the following are open-source vulnerability scanners?

  • A. Nessus
  • B. NetRecon
  • C. Hackbot
  • D. Nikto

Answer: ACD

NEW QUESTION 19
Which of the following commands will you use with the tcpdump command to display the contents of the packets?

  • A. tcpdump -q
  • B. tcpdump -v
  • C. tcpdump -n
  • D. tcpdump –A

Answer: D

NEW QUESTION 20
......

P.S. Allfreedumps.com now are offering 100% pass ensure GCIA dumps! All GCIA exam questions have been updated with correct answers: https://www.allfreedumps.com/GCIA-dumps.html (508 New Questions)


START GCIA EXAM