Our pass rate is high to 98.9% and the similarity percentage between our GCIA study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the GIAC GCIA exam in just one try? I am currently studying for the GIAC GCIA exam. Latest GIAC GCIA Test exam practice questions and answers, Try GIAC GCIA Brain Dumps First.

GIAC GCIA Free Dumps Questions Online, Read and Test Now.

NEW QUESTION 1
Which of the following IP packet elements is responsible for authentication while using IPSec?

  • A. Internet Key Exchange (IKE)
  • B. Authentication Header (AH)
  • C. Layer 2 Tunneling Protocol (L2TP)
  • D. Encapsulating Security Payload (ESP)

Answer: B

NEW QUESTION 2
You are using the TRACERT utility to trace the route to CertLeader.com. You receive the following output:
Which of the following conclusions can you draw from viewing the output?
Each correct answer represents a complete solution. Choose two.

  • A. Everything is fin
  • B. One of the routers on the path to the destination is not functiona
  • C. The destination computer is not operationa
  • D. The IP address of the destination computer is not resolve

Answer: BC

NEW QUESTION 3
In which of the following IKE phases the IPsec endpoints establish parameters for a secure ISAKMP session?

  • A. IKE Phase 2.5
  • B. IKE Phase 2
  • C. IKE Phase 1
  • D. IKE Phase 1.5

Answer: C

NEW QUESTION 4
Which of the following is an exact duplicate of computer's hard drive?

  • A. system image
  • B. bit-stream image
  • C. data image
  • D. drive image

Answer: B

NEW QUESTION 5
Which of the following IPv6 address types is a single address that can be assigned to multiple interfaces?

  • A. Unicast
  • B. Anycast
  • C. Loopback
  • D. Multicast

Answer: B

NEW QUESTION 6
Which of the following TCP/UDP port is used by the toolkit program netstat?

  • A. Port 23
  • B. Port 15
  • C. Port 7
  • D. Port 69

Answer: B

NEW QUESTION 7
Which of the following command line tools are available in Helix Live acquisition tool on Windows?
Each correct answer represents a complete solution. Choose all that apply.

  • A. netstat
  • B. ipconfig
  • C. .cab extractors
  • D. whois

Answer: ABC

NEW QUESTION 8
You work as a Network Administrator for Net Perfect Inc. The company has a TCP/IP-based network. You are configuring an Internet connection on a server. Which of the following servers filters outbound Web traffic on the network?

  • A. Proxy server
  • B. DNS server
  • C. WINS server
  • D. DHCP server

Answer: A

NEW QUESTION 9
You work as a professional Computer Hacking Forensic Investigator. A project has been assigned to you to investigate Plagiarism occurred in the source code files of C#. Which of the following tools will you use to detect the software plagiarism?

  • A. VAST
  • B. Jplag
  • C. SCAM
  • D. Turnitin

Answer: B

NEW QUESTION 10
You work as a Network Administrator for McNeil Inc. The company's Windows 2000-based network is configured with Internet Security and Acceleration (ISA) Server 2000. You want to configure intrusion detection on the server. You find that the different types of attacks on the Intrusion Detection tab page of the IP Packet Filters Properties dialog box are disabled. What is the most likely cause?

  • A. The PPTP through ISA firewall check box on the PPTP tab page of the IP Packet Filters Properties dialog box is not enable
  • B. The Enable IP routing check box on the General tab page of the IP Packet Filters Properties dialog box is not selecte
  • C. The Log packets from Allow filters check box on the Packet Filters tab page of the IP Packet Filters Properties dialog box is not enable
  • D. The Enable Intrusion detection check box on the General tab page of the IP Packet Filters Properties dialog box is not selecte

Answer: D

NEW QUESTION 11
Which of the following techniques allows the existence of both the Ipv6 and Ipv4 protocols in a device or network?

  • A. Duplexing
  • B. Dual stack
  • C. Clustering
  • D. Mirroring

Answer: B

NEW QUESTION 12
Which of the following proxy servers is also referred to as transparent proxies or forced proxies?

  • A. Tunneling proxy server
  • B. Reverse proxy server
  • C. Anonymous proxy server
  • D. Intercepting proxy server

Answer: D

NEW QUESTION 13
Which of the following forensic tool suite is developed for Linux operating system?

  • A. Wetstone
  • B. MForensicsLab
  • C. ProDiscover
  • D. S.M.A.R.

Answer: D

NEW QUESTION 14
Which of the following is an open-source Web server scanner that tests Web servers for dangerous files/CGIs, outdated server software?

  • A. Nmap
  • B. Internet bot
  • C. Dsniff
  • D. Nikto

Answer: D

NEW QUESTION 15
For a host to have successful Internet communication, which of the following network protocols are required? You should assume that the users will not manually configure the computer in anyway and that the measure of success will be whether the user can access Web sites after powering the computer and logging on.
Each correct answer represents a complete solution. Choose all that apply.

  • A. DNS
  • B. HTTP/HTTPS
  • C. DHCP
  • D. NTP

Answer: ABC

NEW QUESTION 16
Adam works as a professional Computer Hacking Forensic Investigator. A project has been assigned to him to investigate the main server of SecureEnet Inc. The server runs on Debian Linux operating system. Adam wants to investigate and review the GRUB configuration file of the server system. Which of the following files will Adam investigate to accomplish the task?

  • A. /boot/grub/menu.lst
  • B. /grub/grub.com
  • C. /boot/boot.conf
  • D. /boot/grub/grub.conf

Answer: A

NEW QUESTION 17
Which of the following are well-known ports?
Each correct answer represents a complete solution. Choose two.

  • A. 443
  • B. 21
  • C. 1024
  • D. 8080

Answer: AB

NEW QUESTION 18
Which of the following NETSH commands for interface Internet protocol version 4 (IPv4) is used to delete a DNS server or all DNS servers from a list of DNS servers for a specified interface or for all interfaces?

  • A. alter dnsserver
  • B. delete dnsserver
  • C. disable dnsserver
  • D. remove dnsserver

Answer: B

NEW QUESTION 19
You work as a Network Administrator for CertLeader Inc. The company has deployed an ASA at the network perimeter. Which of the following types of firewall will you use to create two different communications, one between the client and the firewall, and the other between the firewall and the end server?

  • A. Proxy-based firewall
  • B. Endian firewall
  • C. Stateful firewall
  • D. Packet filter firewall

Answer: A

NEW QUESTION 20
An attacker changes the address of a sub-routine in such a manner that it begins to point to the address of the malicious code. As a result, when the function has been exited, the application can be forced to shift to the malicious code. The image given below explains this phenomenon:
GCIA dumps exhibit
Which of the following tools can be used as a countermeasure to such an attack?

  • A. Obiwan
  • B. SmashGuard
  • C. Kismet
  • D. Absinthe

Answer: B

NEW QUESTION 21
......

P.S. Easily pass GCIA Exam with 508 Q&As Dumps-hub.com Dumps & pdf Version, Welcome to Download the Newest Dumps-hub.com GCIA Dumps: https://www.dumps-hub.com/GCIA-dumps.html (508 New Questions)