Exam Code: GCIA (Practice Exam Latest Test Questions VCE PDF)
Exam Name: GIAC Certified Intrusion Analyst
Certification Provider: GIAC
Free Today! Guaranteed Training- Pass GCIA Exam.
Online GCIA free questions and answers of New Version:
NEW QUESTION 1
Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?
Each correct answer represents a complete solution. Choose three.
Answer: ABC
NEW QUESTION 2
You are using the TRACERT utility to trace the route to CertLeader.com. You receive the following output:
Which of the following conclusions can you draw from viewing the output?
Each correct answer represents a complete solution. Choose two.
Answer: BC
NEW QUESTION 3
Which of the following terms is used to represent IPv6 addresses?
Answer: B
NEW QUESTION 4
Adam works as a professional Computer Hacking Forensic Investigator. He works with the local police.
A project has been assigned to him to investigate an iPod, which was seized from a student of the high school. It is suspected that the explicit child pornography contents are stored in the iPod. Adam wants to investigate the iPod extensively. Which of the following operating systems will Adam use to carry out his investigations in more extensive and elaborate manner?
Answer: B
NEW QUESTION 5
Which of the following Linux/UNIX commands is used to delete files permanently so that the files cannot be recovered?
Answer: B
NEW QUESTION 6
Mark works as a Network Security Administrator for BlueWells Inc. The company has a Windowsbased network. Mark is giving a presentation on Network security threats to the newly recruited employees of the company. His presentation is about the External threats that the company recently faced in the past. Which of the following statements are true about external threats?
Each correct answer represents a complete solution. Choose three.
Answer: ACD
NEW QUESTION 7
Which of the following file systems supports the hot fixing feature?
Answer: C
NEW QUESTION 8
Which of the following protocols is used by TFTP as a file transfer protocol?
Answer: A
NEW QUESTION 9
John works as a Network Administrator for DigiNet Inc. He wants to investigate failed logon attempts to a network. He uses Log Parser to detail out the failed logons over a specific time frame. He uses the following commands and query to list all failed logons on a specific date:
logparser.exe file:FailedLogons.sql -i:EVT -o:datagrid
SELECT
timegenerated AS LogonTime,
extract_token(strings, 0, '|') AS UserName
FROM Security
WHERE EventID IN (529;
530;
531;
532;
533;
534;
535;
537;
539)
AND to_string(timegenerated,'yyyy-MM-dd HH:mm:ss') like '2004-09%'
After investigation, John concludes that two logon attempts were made by using an expired account. Which of the following EventID refers to this failed logon?
Answer: A
NEW QUESTION 10
Peter works as a professional Computer Hacking Forensic Investigator for eLaw-Suit law firm. He is working on a case of a cyber crime. Peter knows that the good investigative report should not only communicate the relevant facts, but also present expert opinion. This report should not include the cases in which the expert acted as a lay witness. Which of the following type of witnesses is a lay witness?
Answer: D
NEW QUESTION 11
Which of the following cryptographic methods are used in EnCase to ensure the integrity of the data, which is acquired for the investigation?
Each correct answer represents a complete solution. Choose two.
Answer: AD
NEW QUESTION 12
Which of the following commands is used to verify the hash value in Netcat?
Answer: A
NEW QUESTION 13
Which of the following Windows XP system files handles memory management, I/O operations, and interrupts?
Answer: C
NEW QUESTION 14
Which of the following IDs is used to reassemble the fragments of a datagram at the destination point?
Answer: C
NEW QUESTION 15
Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized
Zone (DMZ) to insulate the rest of the network from the portions that is available to the Internet.
Which of the following security threats may occur if DMZ protocol attacks are performed?
Each correct answer represents a complete solution. Choose all that apply.
Answer: ABD
NEW QUESTION 16
Which of the following attacks is designed to deduce the brand and/or version of an operating system or application?
Answer: B
NEW QUESTION 17
Which of the following types of Intrusion detection systems (IDS) is used for port mirroring?
Answer: B
NEW QUESTION 18
Which of the following methods is used by forensic investigators to acquire an image over the network in a secure manner?
Answer: C
NEW QUESTION 19
Which of the following commands used in Linux to create bit-stream images?
Answer: C
NEW QUESTION 20
......
P.S. Surepassexam now are offering 100% pass ensure GCIA dumps! All GCIA exam questions have been updated with correct answers: https://www.surepassexam.com/GCIA-exam-dumps.html (508 New Questions)