GCIA Premium Bundle

GCIA Premium Bundle

GIAC Certified Intrusion Analyst Certification Exam

4.5 
(56415 ratings)
508 QuestionsPractice Tests
508 PDFPrint version
September 29, 2024Last update

GIAC GCIA Free Practice Questions

Master the GCIA GIAC Certified Intrusion Analyst content and be ready for exam day success quickly with this Examcollection GCIA dumps. We guarantee it!We make it a reality and give you real GCIA questions in our GIAC GCIA braindumps.Latest 100% VALID GIAC GCIA Exam Questions Dumps at below page. You can use our GIAC GCIA braindumps and pass your exam.

Online GCIA free questions and answers of New Version:

NEW QUESTION 1
Which of the following can be applied as countermeasures against DDoS attacks?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Limiting the amount of network bandwidt
  • B. Blocking IP addres
  • C. Using LM hashes for password
  • D. Using Intrusion detection system
  • E. Using the network-ingress filterin

Answer: ABDE

NEW QUESTION 2
Which of the following is the purpose of creating a Demilitarized zone (DMZ) in an enterprise network?

  • A. Performing Isolation
  • B. Creating Autonomous Systems
  • C. Intrusion Detection
  • D. Military usage

Answer: A

NEW QUESTION 3
Adam works as a Security administrator for Umbrella Inc. He runs the following traceroute and notice that hops 19 and 20 both show the same IP address.
* 1 172.16.1.254 (172.16.1.254) 0.724 ms 3.285 ms 0.613 ms 2 ip68-98-176-1.nv.nv.cox.net (68.98.176.1) 12.169 ms 14.958 ms 13.416 ms 3 ip68-98-176-1.nv.nv.cox.net (68.98.176.1) 13.948 ms ip68-100-0-1.nv.nv. cox.net (68.100.0.1) 16.743 ms 16.207 ms 4 ip68-100-0-137.nv.nv.cox.net (68.100.0.137) 17.324 ms 13.933 ms 20.938 ms 5 68.1.1.4 (68.1.1.4) 12.439 ms 220.166 ms 204.170 ms 6 so-6-0-0.gar2.wdc1.Level3.net (67.29.170.1) 16.177 ms 25.943 ms 14.104 ms 7 unknown.Level3.net (209.247.9.173) 14.227 ms 17.553 ms 15.415 ms "CertLeader" -8 so-0-1-0.bbr1.NewYork1.level3.net (64.159.1.41) 17.063 ms 20.960 ms 19.512 ms 9 so-7-0-0.gar1. NewYork1.Level3.net (64.159.1.182) 20.334 ms 19.440 ms 17.938 ms 10 so-4-0-0.edge1.NewYork1.Level3. net (209.244.17.74) 27.526 ms 18.317 ms 21.202 ms 11 uunet-level3-oc48.NewYork1.Level3.net
(209.244.160.12) 21.411 ms 19.133 ms 18.830 ms 12 0.so-6-0-0.XL1.NYC4.ALTER.NET
(152.63.21.78)
* 21.203 ms 22.670 ms 20.111 ms 13 0.so-2-0-0.TL1.NYC8.ALTER.NET (152.63.0.153)
* 30.929 ms 24.858 ms
* 23.108 ms 14 0.so-4-1-0.TL1.ATL5.ALTER.NET (152.63.10.129) 37.894 ms 33.244 ms
* 33.910 ms 15 0.so-7-0-0.XL1.MIA4.ALTER.NET (152.63.86.189) 51.165 ms 49.935 ms
* 49.466 ms 16 0.so-3-0-0.XR1.MIA4.ALTER.
NET (152.63.101.41) 50.937 ms 49.005 ms 51.055 ms 17 117.ATM6-
* 0.GW5.MIA1.ALTER.NET (152.63.82.73) 51.897 ms 50.280 ms 53.647 ms 18 CertLeadergw1.
customer.alter.net (65.195.239.14) 51.921 ms 51.571 ms 56.855 ms 19
www.CertLeader.com (65.195.239.22) 52.191 ms 52.571 ms 56.855 ms 20
www.CertLeader.com (65.195.239.22) 53.561 ms 54.121 ms 58.333 ms
Which of the following is the most like cause of this issue?

  • A. Intrusion Detection System
  • B. An application firewall
  • C. Network Intrusion system
  • D. A stateful inspection firewall

Answer: D

NEW QUESTION 4
Computer networks and the Internet are the prime mode of Information transfer today. Which of the following is a technique used for modifying messages, providing Information and Cyber security, and reducing the risk of hacking attacks during communications and message passing over the Internet?

  • A. Risk analysis
  • B. Cryptography
  • C. Firewall security
  • D. OODA loop

Answer: B

NEW QUESTION 5
Which of the following is a valid IPv6 address?

  • A. 45C
  • B. 6D53: 12C
  • C. AFC7: E654: BB32: 54AT: FACE
  • D. 45C
  • E. 6D53: 12KP: AFC7: E654: BB32: 543
  • F. FACE
  • G. 123.111.243.123
  • H. 45C
  • I. 6D53: 12C
  • J. AFC7: E654: BB32: 543
  • K. FACE

Answer: D

NEW QUESTION 6
Who are the primary victims of smurf attacks on the contemporary Internet system?

  • A. FTP servers are the primary victim to smurf attacks
  • B. IRC servers are the primary victim to smurf attacks
  • C. SMTP servers are the primary victim to smurf attacks
  • D. Mail servers are the primary victim to smurf attacks

Answer: B

NEW QUESTION 7
Mark has been assigned a project to configure a wireless network for a company. The network should contain a Windows 2003 server and 30 Windows XP client computers. Mark has a single dedicated Internet connection that has to be shared among all the client computers and the server. The configuration needs to be done in a manner that the server should act as a proxy server for the client computers. Which of the following programs can Mark use to fulfill this requirement?

  • A. Microsoft Internet Security & Acceleration Server (ISA)
  • B. Wingate
  • C. Sniffer
  • D. SOCKS

Answer: B

NEW QUESTION 8
Which of the following programs is used to add words to spam e-mails so that the e-mail is not considered spam and therefore is delivered as if it were a normal message?

  • A. Adler-32
  • B. Hash filtrer
  • C. Hash buster
  • D. Checksum

Answer: C

NEW QUESTION 9
Peter works as a System Administrator for TechSoft Inc. The company uses Linux-based systems.
Peter's manager suspects that someone is trying to log in to his computer in his absence. Which of the following commands will Peter run to show the last unsuccessful login attempts, as well as the users who have last logged in to the manager's system?
Each correct answer represents a complete solution. Choose two.

  • A. lastb
  • B. pwd
  • C. last
  • D. rwho -a

Answer: AC

NEW QUESTION 10
Which of the following protocols is used by voice over IP (VoIP) applications?

  • A. UDP
  • B. TCP
  • C. ICMP
  • D. IPv6

Answer: A

NEW QUESTION 11
Which of the following types of attacks uses ICMP to consume bandwidth and crash sites?

  • A. MITM attack
  • B. SYN flood attack
  • C. TFN attack
  • D. XSS attack

Answer: C

NEW QUESTION 12
You work as a Network Administrator for McRobert Inc. You plan to configure your Windows Vista computer for Internet access. To achieve this, which of the following communication protocols needs to be bound to the dial-up adapter?

  • A. TCP/IP
  • B. DLC
  • C. NetBEUI
  • D. AppleTalk

Answer: A

NEW QUESTION 13
Which of the following tools is used to detect spam email without checking the content?

  • A. Kismet
  • B. EtherApe
  • C. DCC
  • D. Sniffer

Answer: C

NEW QUESTION 14
In the DNS Zone transfer enumeration, an attacker attempts to retrieve a copy of the entire zone file for a domain from a DNS server. The information provided by the DNS zone can help an attacker gather user names, passwords, and other valuable information. To attempt a zone transfer, an attacker must be connected to a DNS server that is the authoritative server for that zone. Besides this, an attacker can launch a Denial of Service attack against the zone's DNS servers by flooding them with a lot of requests. Which of the following tools can an attacker use to perform a DNS zone transfer?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Dig
  • B. Host
  • C. NSLookup
  • D. DSniff

Answer: ABC

NEW QUESTION 15
For a host to have successful Internet communication, which of the following network protocols are required? You should assume that the users will not manually configure the computer in anyway and that the measure of success will be whether the user can access Web sites after powering the computer and logging on.
Each correct answer represents a complete solution. Choose all that apply.

  • A. NTP
  • B. HTTP/HTTPS
  • C. DNS
  • D. DHCP

Answer: BCD

NEW QUESTION 16
Which of the following can be applied as countermeasures against DDoS attacks?
Each correct answer represents a complete solution. Choose all that apply.

  • A. Limiting the amount of network bandwidth
  • B. Blocking IP address
  • C. Using LM hashes for passwords
  • D. Using Intrusion detection systems
  • E. Using the network-ingress filtering

Answer: ABDE

NEW QUESTION 17
You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. The network contains a Windows Server 2008 Core computer. You want to install the DNS server role on the Windows Server 2008 Core computer. Which of the following commands will you use to accomplish the task?

  • A. start /w ocsetup DnsServercorerole
  • B. net start "dns server"
  • C. start /w ocsetup DNS-Server-Core-Role
  • D. start /w ocsetup DnsServer

Answer: C

NEW QUESTION 18
Adam works as a professional Computer Hacking Forensic Investigator, a project has been assigned to him to investigate and examine files present on suspect's computer. Adam uses a tool with the help of which he can examine recovered deleted files, fragmented files, and other corrupted data. He can also examine the data, which was captured from the network, and access the physical RAM, and any processes running in virtual memory with the help of this tool. Which of the following tools is Adam using?

  • A. Vedit
  • B. WinHex
  • C. HxD
  • D. Evidor

Answer: B

NEW QUESTION 19
Sandra, a novice computer user, works on Windows environment. She experiences some problem regarding bad sectors formed in a hard disk of her computer. She wants to run CHKDSK command to check the hard disk for bad sectors and to fix the errors, if any, occurred. Which of the following switches will she use with CHKDSK command to accomplish the task?

  • A. CHKDSK /I
  • B. CHKDSK /R /F
  • C. CHKDSK /C /L
  • D. CHKDSK /V /X

Answer: B

NEW QUESTION 20
......

P.S. Easily pass GCIA Exam with 508 Q&As Dumpscollection.com Dumps & pdf Version, Welcome to Download the Newest Dumpscollection.com GCIA Dumps: https://www.dumpscollection.net/dumps/GCIA/ (508 New Questions)


START GCIA EXAM