GCIA Premium Bundle

GCIA Premium Bundle

GIAC Certified Intrusion Analyst Certification Exam

4.5 
(56370 ratings)
508 QuestionsPractice Tests
508 PDFPrint version
November 23, 2024Last update

GIAC GCIA Free Practice Questions

we provide Printable GIAC GCIA simulations which are the best for clearing GCIA test, and to get certified by GIAC GIAC Certified Intrusion Analyst. The GCIA Questions & Answers covers all the knowledge points of the real GCIA exam. Crack your GIAC GCIA Exam with latest dumps, guaranteed!

Free demo questions for GIAC GCIA Exam Dumps Below:

NEW QUESTION 1
Which of the following fields of the IPv6 header is similar to the TTL field of IPv4?

  • A. Hop Limit
  • B. Next Header
  • C. Flow Label
  • D. Traffic Class

Answer: A

NEW QUESTION 2
Which of the following switches is used with Pslist command on the command line to show the statistics for all active threads on the system, grouping these threads with their owning process?

  • A. Pslist -x
  • B. Pslist -m
  • C. Pslist -t
  • D. Pslist -d

Answer: D

NEW QUESTION 3
You work as a system administrator for BlueSkwer.com. You are using IPv6 on all computers. You want to ensure that you do not need to manually configure the IPv6 addresses. You want to take advantage of the router discovery features. For router discovery to work properly, what is needed?

  • A. A properly configured IPv6 router
  • B. Network load balancers
  • C. CAT 6 cables
  • D. Internet Explorer 8

Answer: A

NEW QUESTION 4
Which of the following is the best method of accurately identifying the services running on a victim host?

  • A. Use of hit and trial method to guess the services and ports of the victim hos
  • B. Use of a port scanner to scan each port to confirm the services runnin
  • C. Use of a vulnerability scanner to try to probe each port to verify which service is runnin
  • D. Use of the manual method of telnet to each of the open port

Answer: D

NEW QUESTION 5
Which of the following types of write blocker device uses one interface for one side and a different one for the other?

  • A. Pros
  • B. Tailgat
  • C. Indiff
  • D. Native

Answer: B

NEW QUESTION 6
What is the name of the first computer virus that infected the boot sector of the MS-DOS operating system?

  • A. Stoner
  • B. Code Red
  • C. Brain
  • D. Sircam

Answer: C

NEW QUESTION 7
Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?
Each correct answer represents a complete solution. Choose three.

  • A. These are the threats that originate from outside an organization in which the attacker attempts to gain unauthorized acces
  • B. These are the threats that originate from within the organizatio
  • C. These are the threats intended to flood a network with large volumes of access request
  • D. These threats can be countered by implementing security controls on the perimeters of the network, such as firewalls, which limit user access to the Interne

Answer: ACD

NEW QUESTION 8
In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?

  • A. Frequency
  • B. Delay
  • C. Load
  • D. Bandwidth

Answer: A

NEW QUESTION 9
Which of the following is a hardware/software platform that is designed to analyze, detect, and report on security related events. NIPS is designed to inspect traffic and based on its configuration or security policy, it can drop the malicious traffic?

  • A. NIPS
  • B. HIPS
  • C. NIDS
  • D. HIDS

Answer: A

NEW QUESTION 10
Which of the following is NOT the functional area of a forensic laboratory?

  • A. Network facilities
  • B. Evidence storage
  • C. Administrative area
  • D. Research area

Answer: D

NEW QUESTION 11
Which of the following configuration schemes in IPv6 allows a client to automatically configure its own IP address with or without IPv6 routers?

  • A. Stateless autoconfiguration
  • B. Stateful autoconfiguration
  • C. Stateless configuration
  • D. Stateful configuration

Answer: A

NEW QUESTION 12
What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise?

  • A. The application layer port numbers and the transport layer headers
  • B. The presentation layer headers and the session layer port numbers
  • C. The network layer headers and the session layer port numbers
  • D. The transport layer port numbers and the application layer headers

Answer: D

NEW QUESTION 13
Which of the following ports is used for DNS services?

  • A. Port 7
  • B. Port 53
  • C. Port 80
  • D. Port 23

Answer: B

NEW QUESTION 14
Which of the following tools is an open source network intrusion prevention and detection system that operates as a network sniffer?

  • A. Swatch
  • B. IPLog
  • C. Timbersee
  • D. Snort

Answer: D

NEW QUESTION 15
Which of the following files records all driver installations after the system has booted?

  • A. setupapi.com
  • B. recdriver.log
  • C. drivinst.log
  • D. setupapi.log

Answer: D

NEW QUESTION 16
Adam, an expert computer user, doubts that virus named love.exe has attacked his computer. This virus acquires hidden and read-only attributes, so it is difficult to delete it. Adam decides to delete virus file love.exe from the command line. He wants to use del command for this purpose. Which of the following switches will he use with del command to delete hidden and read only-files?

  • A. del /f /ah
  • B. del /q /ar
  • C. del /p /ar
  • D. del /q

Answer: A

NEW QUESTION 17
Andrew works as a System Administrator for NetPerfect Inc. All client computers on the network run on Mac OS X. The Sales Manager of the company complains that his MacBook is not able to boot. Andrew wants to check the booting process. He suspects that an error persists in the bootloader of Mac OS X. Which of the following is the default bootloader on Mac OS X that he should use to resolve the issue?

  • A. LILO
  • B. BootX
  • C. NT Loader
  • D. GRUB

Answer: B

NEW QUESTION 18
Which of the following ports is used by NTP for communication?

  • A. 143
  • B. 123
  • C. 161
  • D. 53

Answer: B

NEW QUESTION 19
Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc. Which of the following types of Cross-Site Scripting attack Ryan intends to do?

  • A. Non persistent
  • B. SAX
  • C. Persistent
  • D. Document Object Model (DOM)

Answer: C

NEW QUESTION 20
......

P.S. Thedumpscentre.com now are offering 100% pass ensure GCIA dumps! All GCIA exam questions have been updated with correct answers: https://www.thedumpscentre.com/GCIA-dumps/ (508 New Questions)


START GCIA EXAM